Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

selinux-policy-doc-3.14.6-28.fc33 RPM for noarch

From Fedora 33 for s390x / s

Name: selinux-policy-doc Distribution: Fedora Project
Version: 3.14.6 Vendor: Fedora Project
Release: 28.fc33 Build date: Wed Sep 30 15:09:36 2020
Group: Unspecified Build host: buildvm-s390x-01.s390.fedoraproject.org
Size: 33392014 Source RPM: selinux-policy-3.14.6-28.fc33.src.rpm
Packager: Fedora Project
Url: https://github.com/fedora-selinux/selinux-policy
Summary: SELinux policy documentation
SELinux policy documentation package

Provides

Requires

License

GPLv2+

Changelog

* Fri Sep 25 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-28
  - Allow chronyd_t to accept and make NTS-KE connections
  - Allow domain write to an automount unnamed pipe
  - Label /var/run/zincati/public/motd.d/* as motd_var_run_t
  - Allow login programs to (only) read MOTD files and symlinks
  - Relabel /usr/sbin/charon-systemd as ipsec_exec_t
  - Confine systemd-sleep service
  - Add fstools_rw_swap_files() interface
  - Label 4460/tcp port as ntske_port_t
  - Add lvm_dbus_send_msg(), lvm_rw_var_run() interfaces
  - Check out the right -contrib branch in Travis
  - Allow additional permissions for gnome-initial-setup
  - Add to map non_security_files to the userdom_admin_user_template template
* Fri Sep 18 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-27
  - kernel/filesystem: Add exfat support (no extended attributes)
  - Allow additional permissions for gnome-initial-setup
* Tue Sep 08 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-26
  - Allow php-fpm write access to /var/run/redis/redis.sock
  - Allow journalctl to read and write to inherited user domain tty
  - Update rkt policy to allow rkt_t domain to read sysfs filesystem
  - Allow arpwatch create and use rdma socket
  - Allow plymouth sys_chroot capability
  - Allow gnome-initial-setup execute in a xdm sandbox
  - Add new devices and filesystem interfaces
* Thu Aug 27 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-25
  - Allow certmonger fowner capability
  - The nfsdcld service is now confined by SELinux
  - Change transitions for ~/.config/Yubico
  - Allow all users to connect to systemd-userdbd with a unix socket
  - Add file context for ~/.config/Yubico
  - Allow syslogd_t domain to read/write tmpfs systemd-bootchart files
  - Allow login_pgm attribute to get attributes in proc_t
  - Allow passwd to get attributes in proc_t
  - Revert "Allow passwd to get attributes in proc_t"
  - Revert "Allow login_pgm attribute to get attributes in proc_t"
  - Allow login_pgm attribute to get attributes in proc_t
  - Allow passwd to get attributes in proc_t
  - Allow traceroute_t and ping_t to bind generic nodes.
  - Create macro corenet_icmp_bind_generic_node()
  - Allow unconfined_t to node_bind icmp_sockets in node_t domain
* Thu Aug 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-24
  - Add ipa_helper_noatsecure() interface unconditionally
  - Conditionally allow nagios_plugin_domain dbus chat with init
  - Revert "Update allow rules set for nrpe_t domain"
  - Add ipa_helper_noatsecure() interface to ipa.if
  - Label /usr/libexec/qemu-pr-helper with virtd_exec_t
  - Allow kadmind manage kerberos host rcache
  - Allow nsswitch_domain to connect to systemd-machined using a unix socket
  - Define named file transition for sshd on /tmp/krb5_0.rcache2
  - Allow systemd-machined create userdbd runtime sock files
  - Disable kdbus module before updating
* Mon Aug 03 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-23
  - Revert "Add support for /sys/fs/kdbus and allow login_pgm domain to access it."
  - Revert "Add interface to allow types to associate with cgroup filesystems"
  - Revert "kdbusfs should not be accessible for now."
  - Revert "kdbusfs should not be accessible for now by default for shipped policies. It should be moved to kdbus.pp"
  - Revert "Add kdbus.pp policy to allow access /sys/fs/kdbus. It needs to go with own module because this is workaround for now to avoid SELinux in enforcing mode."
  - Remove the legacy kdbus module
  - Remove "kdbus = module" from modules-targeted-base.conf
* Thu Jul 30 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-22
  - Allow virtlockd only getattr and lock block devices
  - Allow qemu-ga read all non security file types conditionally
  - Allow virtlockd manage VMs posix file locks
  - Allow smbd get attributes of device files labeled samba_share_t
  - Label /tmp/krb5_0.rcache2 with krb5_host_rcache_t
  - Add a new httpd_can_manage_courier_spool boolean
  - Create interface courier_manage_spool_sockets() in courier policy to allow to search dir and allow manage sock files
  - Revert "Allow qemu-kvm read and write /dev/mapper/control"
  - Revert "Allow qemu read and write /dev/mapper/control"
  - Revert "Dontaudit and disallow sys_admin capability for keepalived_t domain"
  - Dontaudit pcscd_t setting its process scheduling
  - Dontaudit thumb_t setting its process scheduling
  - Allow munin domain transition with NoNewPrivileges
  - Add dev_lock_all_blk_files() interface
  - Allow auditd manage kerberos host rcache files
  - Allow systemd-logind dbus chat with fwupd
* Wed Jul 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 3.14.6-21
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Mon Jul 13 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-20
  - Align gen_tunable() syntax with sepolgen
* Fri Jul 10 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-19
  - Additional support for keepalived running in a namespace
  - Remove systemd_dbus_chat_resolved(pcp_pmie_t)
  - virt: remove the libvirt qmf rules
  - Allow certmonger manage dirsrv services
  - Run ipa_helper_noatsecure(oddjob_t) only if the interface exists
  - Allow domain dbus chat with systemd-resolved
  - Define file context for /var/run/netns directory only
  - Revert "Add support for fuse.glusterfs"
* Tue Jul 07 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-18
  - Allow oddjob_t process noatsecure permission for ipa_helper_t
  - Allow keepalived manage its private type runtime directories
  - Update irqbalance runtime directory file context
  - Allow irqbalance file transition for pid sock_files and directories
  - Allow systemd_private_tmp(dirsrv_tmp_t) instead of dirsrv_t
  - Allow virtlogd_t manage virt lib files
  - Allow systemd set efivarfs files attributes
  - Support systemctl --user in machinectl
  - Allow chkpwd_t read and write systemd-machined devpts character nodes
  - Allow init_t write to inherited systemd-logind sessions pipes
* Fri Jun 26 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-17
  - Allow pdns server to read system state
  - Allow irqbalance nnp_transition
  - Fix description tag for the sssd_connect_all_unreserved_ports tunable
  - Allow journalctl process set its resource limits
  - Add sssd_access_kernel_keys tunable to conditionally access kernel keys
  - Make keepalived work with network namespaces
  - Create sssd_connect_all_unreserved_ports boolean
  - Allow hypervkvpd to request kernel to load a module
  - Allow systemd_private_tmp(dirsrv_tmp_t)
  - Allow microcode_ctl get attributes of sysfs directories
  - Remove duplicate files_dontaudit_list_tmp(radiusd_t) line
  - Allow radiusd connect to gssproxy over unix domain stream socket
  - Add fwupd_cache_t file context for '/var/cache/fwupd(/.*)?'
  - Allow qemu read and write /dev/mapper/control
  - Allow tlp_t can_exec() tlp_exec_t
  - Dontaudit vpnc_t setting its process scheduling
  - Remove files_mmap_usr_files() call for particular domains
  - Allow dirsrv_t list cgroup directories
  - Crete the kerberos_write_kadmind_tmp_files() interface
  - Allow realmd_t dbus chat with accountsd_t
  - Label systemd-growfs and systemd-makefs       as fsadm_exec_t
  - Allow staff_u and user_u setattr generic usb devices
  - Allow sysadm_t dbus chat with accountsd
  - Modify kernel_rw_key() not to include append permission
  - Add kernel_rw_key() interface to access to kernel keyrings
  - Modify systemd_delete_private_tmp() to use delete_*_pattern macros
  - Allow systemd-modules to load kernel modules
  - Add cachefiles_dev_t as a typealias to cachefiles_device_t
  - Allow libkrb5 lib read client keytabs
  - Allow domain mmap usr_t files
  - Remove files_mmap_usr_files() call for systemd domains
  - Allow sshd write to kadmind temporary files
  - Do not audit staff_t and user_t attempts to manage boot_t entries
  - Add files_dontaudit_manage_boot_dirs() interface
  - Allow systemd-tty-ask-password-agent read efivarfs files
* Thu Jun 25 2020 Adam Williamson <awilliam@redhat.com> - 3.14.6-16
  - Fix scriptlets when /etc/selinux/config does not exist
* Thu Jun 04 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-15
  - Add fetchmail_uidl_cache_t type for /var/mail/.fetchmail.pid
  - Support multiple ways of tlp invocation
  - Allow qemu-kvm read and write /dev/mapper/control
  - Introduce logrotate_use_cifs boolean
  - Allow ptp4l_t sys_admin capability to run bpf programs
  - Allow to getattr files on an nsfs filesystem
  - httpd: Allow NoNewPriv transition from systemd
  - Allow rhsmd read process state of all domains and kernel threads
  - Allow rhsmd mmap /etc/passwd
  - Allow systemd-logind manage efivarfs files
  - Allow initrc_t tlp_filetrans_named_content()
  - Allow systemd_resolved_t to read efivarfs
  - Allow systemd_modules_load_t to read efivarfs
  - Introduce systemd_read_efivarfs_type attribute
  - Allow named transition for /run/tlp from a user shell
  - Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
  - Add file context for /sys/kernel/tracing
* Tue May 19 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-14
  - Allow chronyc_t domain to use nsswitch
  - Allow nscd_socket_use() for domains in nscd_use() unconditionally
  - Add allow rules for lttng-sessiond domain
  - Label dirsrv systemd unit files and add dirsrv_systemctl()
  - Allow gluster geo-replication in rsync mode
  - Allow nagios_plugin_domain execute programs in bin directories
  - Allow sys_admin capability for domain labeled systemd_bootchart_t
  - Split the arping path regexp to 2 lines to prevent from relabeling
  - Allow tcpdump sniffing offloaded (RDMA) traffic
  - Revert "Change arping path regexp to work around fixfiles incorrect handling"
  - Change arping path regexp to work around fixfiles incorrect handling
  - Allow read efivarfs_t files by domains executing systemctl file
* Wed Apr 29 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-13
  - Update networkmanager_read_pid_files() to allow also list_dir_perms
  - Update policy for NetworkManager_ssh_t
  - Allow glusterd synchronize between master and slave
  - Allow spamc_t domain to read network state
  - Allow strongswan use tun/tap devices and keys
  - Allow systemd_userdbd_t domain logging to journal
* Tue Apr 14 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-12
  - Allow rngd create netlink_kobject_uevent_socket and read udev runtime files
  - Allow ssh-keygen create file in /var/lib/glusterd
  - Update ctdbd_manage_lib_files() to also allow mmap ctdbd_var_lib_t files
  - Merge ipa and ipa_custodia modules
  - Allow NetworkManager_ssh_t to execute_no_trans for binary ssh_exec_t
  - Introduce daemons_dontaudit_scheduling boolean
  - Modify path for arping in netutils.fc to match both bin and sbin
  - Change file context for /var/run/pam_ssh to match file transition
  - Add file context entry and file transition for /var/run/pam_timestamp
* Tue Mar 31 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-11
  - Allow NetworkManager manage dhcpd unit files
  - Update ninfod policy to add nnp transition from systemd to ninfod
  - Remove container interface calling by named_filetrans_domain.
* Wed Mar 25 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-10
  - Allow openfortivpn exec shell
  - Remove label session_dbusd_tmp_t for /run/user/USERID/systemd
  - Add ibacm_t ipc_lock capability
  - Allow ipsec_t connectto ipsec_mgmt_t
  - Remove ipa_custodia
  - Allow systemd-journald to read user_tmp_t symlinks
* Wed Mar 18 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-9
  - Allow zabbix_t manage and filetrans temporary socket files
  - Makefile: fix tmp/%.mod.fc target
* Fri Mar 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-8
  - Allow NetworkManager read its unit files and manage services
  - Add init_daemon_domain() for geoclue_t
  - Allow to use nnp_transition in pulseaudio_role
  - Allow pdns_t domain to map files in /usr.
  - Label all NetworkManager fortisslvpn plugins as openfortivpn_exec_t
  - Allow login_pgm create and bind on netlink_selinux_socket
* Mon Mar 09 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-7
  - Allow sssd read systemd-resolved runtime directory
  - Allow sssd read NetworkManager's runtime directory
  - Mark nm-cloud-setup systemd units as NetworkManager_unit_file_t
  - Allow system_mail_t to signull pcscd_t
  - Create interface pcscd_signull
  - Allow auditd poweroff or switch to single mode
* Fri Feb 28 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-6
  - Allow postfix stream connect to cyrus through runtime socket
  - Dontaudit daemons to set and get scheduling policy/parameters
* Sat Feb 22 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-5
  - Allow certmonger_t domain to read pkcs_slotd lock files
  - Allow httpd_t domain to mmap own var_lib_t files BZ(1804853)
  - Allow ipda_custodia_t to create udp_socket and added permission nlmsg_read for netlink_route_sockets
  - Make file context more variable for /usr/bin/fusermount and /bin/fusermount
  - Allow local_login_t domain to getattr cgroup filesystem
  - Allow systemd_logind_t domain to manage user_tmp_t char and block devices
* Tue Feb 18 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-4
  - Update virt_read_qemu_pid_files inteface
  - Allow systemd_logind_t domain to getattr cgroup filesystem
  - Allow systemd_logind_t domain to manage user_tmp_t char and block devices
  - Allow nsswitch_domain attribute to stream connect to systemd process
* Sun Feb 16 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-3
  - Allow systemd labeled as init_t to manage systemd_userdbd_runtime_t symlinks
  - Allow systemd_userdbd_t domain to read efivarfs files
* Sat Feb 15 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-2
  - Allow vhostmd communication with hosted virtual machines
  - Add and update virt interfaces
  - Update radiusd policy
  - Allow systemd_private_tmp(named_tmp_t)
  - Allow bacula dac_override capability
  - Allow systemd_networkd_t to read efivarfs
  - Add support for systemd-userdbd
  - Allow systemd system services read efivarfs files
* Sat Feb 15 2020 Lukas Vrabec  <lvrabec@redhat.com> - 3.14.6-1
  - Bump version to 3.14.6 because fedora 32 was branched
* Fri Feb 07 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-24
  - Allow ptp4l_t create and use packet_socket sockets
  - Allow ipa_custodia_t create and use netlink_route_socket sockets.
  - Allow networkmanager_t transition to setfiles_t
  - Create init_create_dirs boolean to allow init create directories
* Fri Jan 31 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-23
  - Allow thumb_t connect to system_dbusd_t BZ(1795044)
  - Allow saslauthd_t filetrans variable files for /tmp directory
  - Added apache create log dirs macro
  - Tiny documentation fix
  - Allow openfortivpn_t to manage net_conf_t files.
  - Introduce boolean openfortivpn_can_network_connect.
  - Dontaudit domain chronyd_t to list in user home dirs.
  - Allow init_t to create apache log dirs.
  - Add file transition for /dev/nvidia-uvm BZ(1770588)
  - Allow syslog_t to read efivarfs_t files
  - Add ioctl to term_dontaudit_use_ptmx macro
  - Update xserver_rw_session macro
* Thu Jan 30 2020 Fedora Release Engineering <releng@fedoraproject.org> - 3.14.5-22
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Fri Jan 24 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-21
  - Dontaudit timedatex_t read file_contexts_t and validate security contexts
  - Make stratisd_t domain unconfined for now.
  - stratisd_t policy updates.
  - Label /var/spool/plymouth/boot.log as plymouthd_var_log_t
  - Label /stratis as stratisd_data_t
  - Allow opafm_t to create and use netlink rdma sockets.
  - Allow stratisd_t domain to read/write fixed disk devices and removable devices.
  - Added macro for stratisd to chat over dbus
  - Add dac_override capability to stratisd_t domain
  - Allow init_t set the nice level of all domains BZ(1778088)
  - Allow userdomain to chat with stratisd over dbus.
* Mon Jan 13 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-20
  - Fix typo in anaconda SELinux module
  - Allow rtkit_t domain  to control scheduling for your install_t processes
  - Boolean: rngd_t to use executable memory
  - Allow rngd_t domain to use nsswitch BZ(1787661)
  - Allow exim to execute bin_t without domain trans
  - Allow create udp sockets for abrt_upload_watch_t domains
  - Drop label zebra_t for frr binaries
  - Allow NetworkManager_t domain to get status of samba services
  - Update milter policy to allow use sendmail
  - Modify file context for .local directory to match exactly BZ(1637401)
  - Allow init_t domain to create own socket files in /tmp
  - Allow ipsec_mgmt_t domain to mmap ipsec_conf_file_t files
  - Create files_create_non_security_dirs() interface
* Fri Dec 20 2019 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-19
  - Allow init_t nnp domain transition to kmod_t
  - Allow userdomain dbus chat with systemd_resolved_t
  - Allow init_t read and setattr on /var/lib/fprintd
  - Allow sysadm_t dbus chat with colord_t
  - Allow confined users run fwupdmgr
  - Allow confined users run machinectl
  - Allow systemd labeled as init_t domain to create dirs labeled as var_t
  - Allow systemd labeled as init_t do read/write tpm_device_t chr files BZ(1778079)
  - Add new file context rabbitmq_conf_t.
  - Allow journalctl read init state BZ(1731753)
  - Add fprintd_read_var_lib_dir and fprintd_setattr_var_lib_dir interfaces
  - Allow pulseaudio create .config and dgram sendto to unpriv_userdomain
  - Change type in transition for /var/cache/{dnf,yum} directory
  - Allow cockpit_ws_t read efivarfs_t BZ(1777085)
  - Allow abrt_dump_oops_t domain to create udp sockets BZ(1778030)
  - Allow named_t domain to mmap named_zone_t files BZ(1647493)
  - Make boinc_var_lib_t label system mountdir attribute
  - Allow stratis_t domain to request load modules
  - Update fail2ban policy
  - Allow spamd_update_t access antivirus_unit_file_t BZ(1774092)
  - Allow uuidd_t Domain trasition from sytemd into confined domain with NoNewPrivileges Systemd Security feature.
  - Allow rdisc_t Domain trasition from sytemd into confined domain with NoNewPrivileges Systemd Security feature.
* Thu Nov 28 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-18
  - Allow systemd to read all proc
  - Introduce new type pdns_var_lib_t
  - Allow zebra_t domain to read files labled as nsfs_t.
  - Allow systemd to setattr on all device_nodes
  - Allow systemd to mounton and list all proc types
* Wed Nov 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-17
  - Fix nonexisting types in rtas_errd_rw_lock interface
  - Allow snmpd_t domain to trace processes in user namespace
  - Allow timedatex_t domain to read relatime clock and adjtime_t files
  - Allow zebra_t domain to execute zebra binaries
  - Label /usr/lib/NetworkManager/dispatcher as NetworkManager_initrc_exec_t
  - Allow ksmtuned_t domain to trace processes in user namespace
  - Allow systemd to read symlinks in /var/lib
  - Update dev_mounton_all_device_nodes() interface
  - Add the miscfiles_map_generic_certs macro to the sysnet_dns_name_resolve macro.
  - Allow systemd_domain to map files in /usr.
  - Allow strongswan start using swanctl method BZ(1773381)
  - Dontaudit systemd_tmpfiles_t getattr of all file types BZ(1772976)
* Thu Nov 21 2019 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-16
  - Allow timedatex_t domain dbus chat with both confined and unconfined users
  - Allow timedatex_t domain dbus chat with unconfined users
  - Allow NetworkManager_t manage dhcpc_state_t BZ(1770698)
  - Make unconfined domains part of domain_named_attribute
  - Label tcp ports 24816,24817 as pulp_port_t
  - Remove duplicate entries for initrc_t in init.te
* Thu Nov 14 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-15
  - Increase SELinux userspace version which should be required.
* Wed Nov 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-14
  - Increase version of kernel compiled binary policy to 32 because of new SELinux userspace v3.0
* Wed Nov 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-13
  - Fix typo bugs in rtas_errd_read_lock() interface
  - cockpit: Drop cockpit-cert-session
  - Allow timedatex_t domain to systemctl chronyd domains
  - Allow ipa_helper_t to read kr5_keytab_t files
  - cockpit: Allow cockpit-session to read cockpit-tls state directory
  - Allow stratisd_t domain to read nvme and fixed disk devices
  - Update lldpad_t policy module
  - Dontaudit tmpreaper_t getting attributes from sysctl_type files
  - cockpit: Support https instance factory
  - Added macro for timedatex to chat over dbus.
  - Fix typo in dev_filetrans_all_named_dev()
  - Update files_manage_etc_runtime_files() interface to allow manage also dirs
  - Fix typo in cachefiles device
  - Dontaudit sys_admin capability for auditd_t domains
  - Allow x_userdomain to read adjtime_t files
  - Allow users using template userdom_unpriv_user_template() to run bpf tool
  - Allow x_userdomain to dbus_chat with timedatex.
* Sun Nov 03 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-12
  - Label /var/cache/nginx as httpd_cache_t
  - Allow abrt_upload_watch_t domain to send dgram msgs to kernel processes and stream connect to journald
  - Created dnsmasq_use_ipset boolean
  - Allow capability dac_override in logwatch_mail_t domain
  - Allow automount_t domain to execute ping in own SELinux domain (ping_t)
  - Allow tmpreaper_t domain to getattr files labeled as mtrr_device_t
  - Allow collectd_t domain to create netlink_generic_socket sockets
  - Allow rhsmcertd_t domain to read/write rtas_errd_var_lock_t files
  - Allow tmpwatch process labeled as tmpreaper_t domain to execute fuser command.
  - Label /etc/postfix/chroot-update as postfix_exec_t
  - Update tmpreaper_t policy due to fuser command
  - Allow kdump_t domain to create netlink_route and udp sockets
  - Allow stratisd to connect to dbus
  - Allow fail2ban_t domain to create netlink netfilter sockets.
  - Allow dovecot get filesystem quotas
  - Allow networkmanager_t domain to execute chronyd binary in chronyd_t domain. BZ(1765689)
  - Allow systemd-tmpfiles processes to set rlimit information
  - Allow cephfs to use xattrs for storing contexts
  - Update files_filetrans_named_content() interface to allow caller domain to create /oldroot /.profile with correct label etc_runtime_t
* Fri Oct 25 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-11
  - Allow confined users to run newaliases
  - Add interface mysql_dontaudit_rw_db()
  - Label /var/lib/xfsdump/inventory as amanda_var_lib_t
  - Allow tmpreaper_t domain to read all domains state
  - Make httpd_var_lib_t label system mountdir attribute
  - Update cockpit policy
  - Update timedatex policy to add macros, more detail below
  - Allow nagios_script_t domain list files labled sysfs_t.
  - Allow jetty_t domain search and read cgroup_t files.
  - Donaudit ifconfig_t domain to read/write mysqld_db_t files
  - Dontaudit domains read/write leaked pipes
* Tue Oct 22 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-10
  - Update timedatex policy to add macros, more detail below
  - Allow nagios_script_t domain list files labled sysfs_t.
  - Allow jetty_t domain search and read cgroup_t files.
  - Allow Gluster mount client to mount files_type
  - Dontaudit and disallow sys_admin capability for keepalived_t domain
  - Update numad policy to allow signull, kill, nice and trace processes
  - Allow ipmievd_t to RW watchdog devices
  - Allow ldconfig_t domain to manage initrc_tmp_t link files Allow netutils_t domain to write to initrc_tmp_t fifo files
  - Allow user domains to manage user session services
  - Allow staff and user users to get status of user systemd session
  - Update sudo_role_template() to allow caller domain to read syslog pid files
* Fri Oct 11 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-9
  - Allow networkmanager_t domain domain transition to chronyc_t domain BZ(1760226)
* Wed Oct 09 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-8
  - Update apache and pkcs policies to make active opencryptoki rules
  - Allow ipa_ods_exporter_t domain to read krb5_keytab files BZ(1759884)
* Wed Oct 09 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-7
  - Revert "nova.fc: fix duplicated slash"
  - Introduce new bolean httpd_use_opencryptoki
  - Add new interface apache_read_state()
  - Allow setroubleshoot_fixit_t to read random_device_t
  - Label /etc/named direcotory as named_conf_t BZ(1759495)
  - nova.fc: fix duplicated slash
  - Allow dkim to execute sendmail
  - Update virt_read_content interface to allow caller domain mmap virt_content_t block devices and files
  - Update aide_t domain to allow this tool to analyze also /dev filesystem
  - Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files BZ(1758634)
  - Allow avahi_t to send msg to xdm_t
  - Allow systemd_logind to read dosfs files & dirs Allow systemd-logind - a system service that manages user logins, to read files and list dirs on a DOS filesystem
  - Update dev_manage_sysfs() to support managing also lnk files BZ(1759019)
  - Allow systemd_logind_t domain to read blk_files in domain removable_device_t
  - Add new interface udev_getattr_rules_chr_files()
* Fri Oct 04 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-6
  - Update aide_t domain to allow this tool to analyze also /dev filesystem
  - Allow bitlbee_t domain map files in /usr
  - Allow stratisd to getattr of fixed disk device nodes
  - Add net_broadcast capability to openvswitch_t domain BZ(1716044)
  - Allow exim_t to read mysqld conf files if exim_can_connect_db is enabled. BZ(1756973)
  - Allow cobblerd_t domain search apache configuration dirs
  - Dontaudit NetworkManager_t domain to write to kdump temp pipies BZ(1750428)
  - Label /var/log/collectd.log as collectd_log_t
  - Allow boltd_t domain to manage sysfs files and dirs BZ(1754360)
  - Add fowner capability to the pcp_pmlogger_t domain BZ(1754767)
  - networkmanager: allow NetworkManager_t to create bluetooth_socket
  - Fix ipa_custodia_stream_connect interface
  - Add new interface udev_getattr_rules_chr_files()
  - Make dbus-broker service working on s390x arch
  - Add new interface dev_mounton_all_device_nodes()
  - Add new interface dev_create_all_files()
  - Allow systemd(init_t) to load kernel modules
  - Allow ldconfig_t domain to manage initrc_tmp_t objects
  - Add new interface init_write_initrc_tmp_pipes()
  - Add new interface init_manage_script_tmp_files()
  - Allow xdm_t setpcap capability in user namespace BZ(1756790)
  - Allow x_userdomain to mmap generic SSL certificates
  - Allow xdm_t domain to user netlink_route sockets BZ(1756791)
  - Update files_create_var_lib_dirs() interface to allow caller domain also set attributes of var_lib_t directory BZ(1754245)
  - Allow sudo userdomain to run rpm related commands
  - Add sys_admin capability for ipsec_t domain
  - Allow systemd_modules_load_t domain to read systemd pid files
  - Add new interface init_read_pid_files()
  - Allow systemd labeled as init_t domain to manage faillog_t objects
  - Add file context ipsec_var_run_t for /var/run/charon\.dck to ipsec.fc
  - Make ipa_custodia policy active
* Fri Sep 20 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-5
  - Fix ipa_custodia_stream_connect interface
  - Allow systemd_modules_load_t domain to read systemd pid files
  - Add new interface init_read_pid_files()
  - Allow systemd labeled as init_t domain to manage faillog_t objects
  - Add file context ipsec_var_run_t for /var/run/charon\.dck to ipsec.fc
* Fri Sep 20 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-4
  - Run ipa-custodia as ipa_custodia_t
  - Update webalizer_t SELinux policy
  - Dontaudit thumb_t domain to getattr of nsfs_t files BZ(1753598)
  - Allow rhsmcertd_t domain to read rtas_errd lock files
  - Add new interface rtas_errd_read_lock()
  - Update allow rules set for nrpe_t domain
  - Update timedatex SELinux policy to to sychronizate time with GNOME and add new macro chronyd_service_status to chronyd.if
  - Allow avahi_t to send msg to lpr_t
  - Label /dev/shm/dirsrv/ with dirsrv_tmpfs_t label
  - Allow dlm_controld_t domain to read random device
  - Label libvirt drivers as virtd_exec_t
  - Add sys_ptrace capability to pcp_pmlogger_t domain BZ(1751816)
  - Allow gssproxy_t domain read state of all processes on system
  - Add new macro systemd_timedated_status to systemd.if to get timedated service status
  - Introduce xdm_manage_bootloader booelan
  - Revert "Unconfined domains, need to create content with the correct labels"
  - Allow xdm_t domain to read sssd pid files BZ(1753240)
  - Move open, audit_access, and execmod to common file perms
* Fri Sep 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-3
  - Add sys_ptrace capability to pcp_pmlogger_t domain BZ(1751816)
  - Allow gssproxy_t domain read state of all processes on system
  - Fix typo in cachefilesd module
  - Allow cachefilesd_t domain to read/write cachefiles_device_t devices
  - Remove setting label for /dev/cachefilesd char device from cachefilesd policy. This should be added in base policy
  - Add sys_admin capability for keepalived_t labeled processes
  - Allow user_mail_domain attribute to manage files labeled as etc_aliases_t.
  - Create new type ipmievd_helper_t domain for loading kernel modules.
  - Run stratisd service as stratisd_t
  - Fix abrt_upload_watch_t in abrt policy
  - Update keepalived policy
  - Update cron_role, cron_admin_role and cron_unconfined_role to avoid *_t_t types
  - Revert "Create admin_crontab_t and admin_crontab_tmp_t types"
  - Revert "Update cron_role() template to accept third parameter with SELinux domain prefix"
  - Allow amanda_t to manage its var lib files and read random_device_t
  - Create admin_crontab_t and admin_crontab_tmp_t types
  - Add setgid and setuid capabilities to keepalived_t domain
  - Update cron_role() template to accept third parameter with SELinux domain prefix
  - Allow psad_t domain to create tcp diag sockets BZ(1750324)
  - Allow systemd to mount fwupd_cache_t BZ(1750288)
  - Allow chronyc_t domain to append to all non_security files
  - Update zebra SELinux policy to make it work also with frr service
  - Allow rtkit_daemon_t domain set process nice value in user namespaces BZ(1750024)
  - Dontaudit rhsmcertd_t to write to dirs labeled as lib_t BZ(1556763)
  - Label /var/run/mysql as mysqld_var_run_t
  - Allow chronyd_t domain to manage and create chronyd_tmp_t dirs,files,sock_file objects.
  - Update timedatex policy to manage localization
  - Allow sandbox_web_type domains to sys_ptrace and sys_chroot in user namespaces
  - Update gnome_dontaudit_read_config
  - Allow devicekit_var_lib_t dirs to be created by systemd during service startup. BZ(1748997)
  - Allow systemd labeled as init_t domain to remount rootfs filesystem
  - Add interface files_remount_rootfs()
  - Dontaudit sys_admin capability for iptables_t SELinux domain
  - Label /dev/cachefilesd as cachefiles_device_t
  - Make stratisd policy active
  - Allow userdomains to dbus chat with policykit daemon
  - Update userdomains to pass correct parametes based on updates from cron_*_role interfaces
  - New interface files_append_non_security_files()
  - Label 2618/tcp and 2618/udp as priority_e_com_port_t
  - Label 2616/tcp and 2616/udp as appswitch_emp_port_t
  - Label 2615/tcp and 2615/udp as firepower_port_t
  - Label 2610/tcp and 2610/udp as versa_tek_port_t
  - Label 2613/tcp and 2613/udp as smntubootstrap_port_t
  - Label 3784/tcp and 3784/udp as bfd_control_port_t
  - Remove rule allowing all processes to stream connect to unconfined domains
* Wed Sep 04 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-2
  - Allow zabbix_t domain to manage zabbix_var_lib_t sock files and connect to unix_stream_socket
  - Dontaudit sandbox web types to setattr lib_t dirs
  - Dontaudit system_mail_t domains to check for existence other applications on system BZ(1747369)
  - Allow haproxy_t domain to read network state of system
  - Allow processes labeled as keepalived_t domain to get process group
  - Introduce dbusd_unit_file_type
  - Allow pesign_t domain to read/write named cache files.
  - Label /var/log/hawkey.log as rpm_log_t and update rpm named filetrans interfaces.
  - Allow httpd_t domain to read/write named_cache_t files
  - Add new interface bind_rw_cache()
  - Allow cupsd_t domain to create directory with name ppd in dirs labeled as cupsd_etc_t with label cupsd_rw_etc_t.
  - Update cpucontrol_t SELinux policy
  - Allow pcp_pmcd_t domain to bind on udp port labeled as statsd_port_t
  - Run lldpd service as lldpad_t.
  - Allow spamd_update_t domain to create unix dgram sockets.
  - Update dbus role template for confined users to allow login into x session
  - Label /usr/libexec/microcode_ctl/reload_microcode as cpucontrol_exec_t
  - Fix typo in networkmanager_append_log() interface
  - Update collectd policy to allow daemon create /var/log/collectd with collectd_log_t label
  - Allow login user type to use systemd user session
  - Allow xdm_t domain to start dbusd services.
  - Introduce new type xdm_unit_file_t
  - Remove allowing all domain to communicate over pipes with all domain under rpm_transition_domain attribute
  - Allow systemd labeled as init_t to remove sockets with tmp_t label BZ(1745632)
  - Allow ipsec_t domain to read/write named cache files
  - Allow sysadm_t to create hawkey log file with rpm_log_t SELinux label
  - Allow domains systemd_networkd_t and systemd_logind_t to chat over dbus
  - Label udp 8125 port as statsd_port_t
* Tue Aug 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-1
  - Bump version
* Tue Aug 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-31
  - Update timedatex policy BZ(1734197)
* Tue Aug 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-30
  - cockpit: Allow cockpit-session to read cockpit-tls state
  - Allow zebrat_t domain to read state of NetworkManager_t processes BZ(1739983)
  - Allow named_t domain to read/write samba_var_t files BZ(1738794)
  - Dontaudit abrt_t domain to read root_t files
  - Allow ipa_dnskey_t domain to read kerberos keytab
  - Allow mongod_t domain to read cgroup_t files BZ(1739357)
  - Update ibacm_t policy
  - Allow systemd to relabel all files on system.
  - Revert "Add new boolean systemd_can_relabel"
  - Allow xdm_t domain to read kernel sysctl BZ(1740385)
  - Add sys_admin capability for xdm_t in user namespace. BZ(1740386)
  - Allow dbus communications with resolved for DNS lookups
  - Add new boolean systemd_can_relabel
  - Allow auditd_t domain to create auditd_tmp_t temporary files and dirs in /tmp or /var/tmp
  - Label '/var/usrlocal/(.*/)?sbin(/.*)?' as bin_t
  - Update systemd_dontaudit_read_unit_files() interface to dontaudit alos listing dirs
  - Run lvmdbusd service as lvm_t
* Wed Aug 07 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-29
  - Allow dlm_controld_t domain setgid capability
  - Fix SELinux modules not installing in chroots.
  Resolves: rhbz#1665643
* Tue Aug 06 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-28
  - Allow systemd to create and bindmount dirs. BZ(1734831)
* Mon Aug 05 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-27
  - Allow tlp domain run tlp in trace mode BZ(1737106)
  - Make timedatex_t domain system dbus bus client BZ(1737239)
  - Allow cgdcbxd_t domain to list cgroup dirs
  - Allow systemd to create and bindmount dirs. BZ(1734831)
* Tue Jul 30 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-26
  - New policy for rrdcached
  - Allow dhcpd_t domain to read network sysctls.
  - Allow nut services to communicate with unconfined domains
  - Allow virt_domain to Support ecryptfs home dirs.
  - Allow domain transition lsmd_t to sensord_t
  - Allow httpd_t to signull mailman_cgi_t process
  - Make rrdcached policy active
  - Label /etc/sysconfig/ip6?tables\.save as system_conf_t Resolves: rhbz#1733542
  - Allow machinectl to run pull-tar BZ(1724247)
* Fri Jul 26 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-25
  - Allow spamd_update_t domain to read network state of system BZ(1733172)
  - Allow dlm_controld_t domain to transition to the lvm_t
  - Allow sandbox_web_client_t domain to do sys_chroot in user namespace
  - Allow virtlockd process read virtlockd.conf file
  - Add more permissions for session dbus types to make working dbus broker with systemd user sessions
  - Allow sssd_t domain to read gnome config and named cache files
  - Allow brltty to request to load kernel module
  - Add svnserve_tmp_t label forl svnserve temp files to system private tmp
  - Allow sssd_t domain to read kernel net sysctls BZ(1732185)
  - Run timedatex service as timedatex_t
  - Allow mysqld_t domain to domtrans to ifconfig_t domain when executing ifconfig tool
  - Allow cyrus work with PrivateTmp
  - Make cgdcbxd_t domain working with SELinux enforcing.
  - Make working wireshark execute byt confined users staff_t and sysadm_t
  - Dontaudit virt_domain to manage ~/.cache dirs BZ(1730963)
  - Allow svnserve_t domain to read system state
  - allow named_t to map named_cache_t files
  - Label user cron spool file with user_cron_spool_t
  - Update gnome_role_template() template to allow sysadm_t confined user to login to xsession
  - Allow lograte_t domain to manage collect_rw_content files and dirs
  - Add interface collectd_manage_rw_content()
  - Allow ifconfig_t domain to manage vmware logs
  - Remove system_r role from staff_u user.
  - Make new timedatex policy module active
  - Add systemd_private_tmp_type attribute
  - Allow systemd to load kernel modules during boot process.
  - Allow sysadm_t and staff_t domains to read wireshark shared memory
  - Label /usr/libexec/utempter/utempter  as utemper_exec_t
  - Allow ipsec_t domain to read/write  l2tpd pipe BZ(1731197)
  - Allow sysadm_t domain to create netlink selinux sockets
  - Make cgdcbxd active in Fedora upstream sources
* Wed Jul 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-24
  - Label user cron spool file with user_cron_spool_t
  - Update gnome_role_template() template to allow sysadm_t confined user to login to xsession
  - Allow lograte_t domain to manage collect_rw_content files and dirs
  - Add interface collectd_manage_rw_content()
  - Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain
  - Update  tomcat_can_network_connect_db boolean to allow tomcat domains also connect to redis ports
  - Allow mysqld_t domain to manage cluster pid files
  - Relabel  /usr/sbin/virtlockd from virt_exec_t to virtlogd_exec_t.
  - Allow ptp4l_t domain to write to pmc socket which is created by pmc command line tool
  - Allow dkim-milter to send e-mails BZ(1716937)
  - Update spamassasin policy to make working /usr/share/spamassassin/sa-update.cron script BZ(1711799)
  - Update svnserve_t policy to make working svnserve hooks
  - Allow varnishlog_t domain to check for presence of varnishd_t domains
  - Update sandboxX policy to make working firefox inside SELinux sandbox
  - Remove allow rule from svirt_transition_svirt_sandbox interface to don't allow containers to connect to random services
  - Allow httpd_t domain to read /var/lib/softhsm/tokens to allow httpd daemon to use pkcs#11 devices
  - Allow gssd_t domain to list tmpfs_t dirs
  - Allow mdadm_t domain to read tmpfs_t files
  - Allow sbd_t domain to check presence of processes labeled as cluster_t
  - Dontaudit httpd_sys_script_t to read systemd unit files
  - Allow blkmapd_t domain to read nvme devices
  - Update cpucontrol_t domain to make working microcode service
  - Allow domain transition from logwatch_t do postfix_postqueue_t
  - Allow chronyc_t domain to create and write to non_security files in case when sysadmin is redirecting output to file e.g: 'chronyc -n tracking > /var/lib/test'
  - Allow httpd_sys_script_t domain to mmap httpcontent
  - Allow sbd_t to manage cgroups_t files
  - Update wireshark policy to make working tshar labeled as wireshark_t
  - Update virt_use_nfs boolean to allow svirt_t domain to mmap nfs_t files
  - Allow sysadm_t domain to create netlink selinux sockets
  - Make cgdcbxd active in Fedora upstream sources
  - Allow sysadm_t domain to dbus chat with rtkit daemon
  - Allow x_userdomains to nnp domain transition to thumb_t domain
  - Allow unconfined_domain_type to setattr own process lnk files.
  - Add interface files_write_generic_pid_sockets()
  - Dontaudit writing to user home dirs by gnome-keyring-daemon
  - Allow staff and admin domains to setpcap in user namespace
  - Allow staff and sysadm to use lockdev
  - Allow staff and sysadm users to run iotop.
  - Dontaudit traceroute_t domain require sys_admin capability
  - Dontaudit dbus chat between kernel_t and init_t
  - Allow systemd labeled as init_t to create mountpoints without any specific label as default_t
* Wed Jul 10 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-23
  - Update dbusd policy and netowrkmanager to allow confined users to connect to vpn over NetworkManager
  - Fix all interfaces which cannot by compiled because of typos
  - Allow X userdomains to mmap user_fonts_cache_t dirs
* Mon Jul 08 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-22
  - Label /var/kerberos/krb5 as krb5_keytab_t
  - Allow glusterd_t domain to setpgid
  - Allow lsmd_t domain to execute /usr/bin/debuginfo-install
  - Allow sbd_t domain to manage cgroup dirs
  - Allow opafm_t domain to modify scheduling information of another process.
  - Allow wireshark_t domain to create netlink netfilter sockets
  - Allow gpg_agent_t domain to use nsswitch
  - Allow httpd script types to mmap httpd rw content
  - Allow dkim_milter_t domain to execute shell BZ(17116937)
  - Allow sbd_t domain to use nsswitch
  - Allow rhsmcertd_t domain to send signull to all domains
  - Allow snort_t domain to create netlink netfilter sockets BZ(1723184)
  - Dontaudit blueman to read state of all domains on system BZ(1722696)
  - Allow boltd_t domain to use ps and get state of all domains on system. BZ(1723217)
  - Allow rtkit_daemon_t to uise sys_ptrace usernamespace capability BZ(1723308)
  - Replace "-" by "_" in types names
  - Change condor_domain declaration in condor_systemctl
  - Allow firewalld_t domain to read iptables_var_run_t files BZ(1722405)
  - Allow auditd_t domain to send signals to audisp_remote_t domain
  - Allow systemd labeled as init_t domain to read/write faillog_t. BZ(1723132)
  - Allow systemd_tmpfiles_t domain to relabel from usermodehelper_t files
  - Add interface kernel_relabelfrom_usermodehelper()
  - Dontaudit unpriv_userdomain to manage boot_t files
  - Allow xdm_t domain to mmap /var/lib/gdm/.cache/fontconfig BZ(1725509)
  - Allow systemd to execute bootloader grub2-set-bootflag BZ(1722531)
  - Allow associate efivarfs_t on sysfs_t
* Tue Jun 18 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-21
  - Add vnstatd_var_lib_t to mountpoint attribute BZ(1648864)
  - cockpit: Support split-out TLS proxy
  - Allow dkim_milter_t to use shell BZ(1716937)
  - Create explicit fc rule for mailman executable BZ(1666004)
  - Update interface networkmanager_manage_pid_files() to allow manage also dirs
  - Allow dhcpd_t domain to mmap dnssec_t files BZ(1718701)
  - Add new interface bind_map_dnssec_keys()
  - Update virt_use_nfs() boolean to allow virt_t to mmap nfs_t files
  - Allow redis_t domain to read public sssd files
  - Allow fetchmail_t to connect to dovecot stream sockets BZ(1715569)
  - Allow confined users to login via cockpit
  - Allow nfsd_t domain to do chroot becasue of new version of nfsd
  - Add gpg_agent_roles to system_r roles
  - Allow qpidd_t domain to getattr all fs_t filesystem and mmap usr_t files
  - Allow rhsmcertd_t domain to manage rpm cache
  - Allow sbd_t domain to read tmpfs_t symlinks
  - Allow ctdb_t domain to manage samba_var_t files/links/sockets and dirs
  - Allow kadmind_t domain to read home config data
  - Allow sbd_t domain to readwrite cgroups
  - Allow NetworkManager_t domain to read nsfs_t files BZ(1715597)
  - Label /var/log/pacemaker/pacemaker as cluster_var_log_t
  - Allow certmonger_t domain to manage named cache files/dirs
  - Allow pcp_pmcd_t domain to domtrans to mdadm_t domain BZ(1714800)
  - Allow crack_t domain read /et/passwd files
  - Label fontconfig cache and config files and directories BZ(1659905)
  - Allow dhcpc_t domain to manage network manager pid files
  - Label /usr/sbin/nft as iptables_exec_t
  - Allow userdomain attribute to manage cockpit_ws_t stream sockets
  - Allow ssh_agent_type to read/write cockpit_session_t unnamed pipes
  - Add interface ssh_agent_signal()
* Thu May 30 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-20
  - Allow pcp_pmcd_t domain to domtrans to mdadm_t domain BZ(1714800)
  - Allow spamd_update_t to exec itsef
  - Fix broken logwatch SELinux module
  - Allow logwatch_mail_t to manage logwatch cache files/dirs
  - Update wireshark_t domain to use several sockets
  - Allow sysctl_rpc_t and sysctl_irq_t to be stored on fs_t
* Mon May 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-19
  - Fix bind_read_cache() interface to allow only read perms to caller domains
  - [speech-dispatcher.if] m4 macro names can not have - in them
  - Grant varnishlog_t access to varnishd_etc_t
  - Allow nrpe_t domain to read process state of systemd_logind_t
  - Allow mongod_t domain to connect on https port BZ(1711922)
  - Allow chronyc_t domain to create own tmpfiles and allow communicate send data over unix dgram sockets
  - Dontaudit spamd_update_t domain to read all domains states BZ(1711799)
  - Allow pcp_pmie_t domain to use sys_ptrace usernamespace cap BZ(1705871)
  - Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119)
  - Revert "Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119)"
  - Make boinc_var_lib_t mountpoint BZ(1711682)
  - Allow wireshark_t domain to create fifo temp files
  - All NetworkManager_ssh_t rules have to be in same optional block with ssh_basic_client_template(), fixing this bug in NetworkManager policy
  - Allow dbus chat between NetworkManager_t and NetworkManager_ssh_t domains. BZ(1677484)
  - Fix typo in gpg SELinux module
  - Update gpg policy to make ti working with confined users
  - Add domain transition that systemd labeled as init_t can execute spamd_update_exec_t binary to run newly created process as spamd_update_t
  - Remove allow rule for virt_qemu_ga_t to write/append user_tmp_t files
  - Label /var/run/user/*/dbus-1 as session_dbusd_tmp_t
  - Add dac_override capability to namespace_init_t domain
  - Label /usr/sbin/corosync-qdevice as cluster_exec_t
  - Allow NetworkManager_ssh_t domain to open communication channel with system dbus. BZ(1677484)
  - Label /usr/libexec/dnf-utils as debuginfo_exec_t
  - Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on
  - Allow nrpe_t domain to be dbus cliennt
  - Add interface sssd_signull()
  - Build in parallel on Travis
  - Fix parallel build of the policy
  - Revert "Make able deply overcloud via neutron_t to label nsfs as fs_t"
  - Add interface systemd_logind_read_state()
  - Fix find commands in Makefiles
  - Allow systemd-timesyncd to read network state BZ(1694272)
  - Update userdomains to allow confined users to create gpg keys
  - Allow associate all filesystem_types with fs_t
  - Dontaudit syslogd_t using kill in unamespaces BZ(1711122)
  - Allow init_t to manage session_dbusd_tmp_t dirs
  - Allow systemd_gpt_generator_t to read/write to clearance
  - Allow su_domain_type to getattr to /dev/gpmctl
  - Update userdom_login_user_template() template to make working systemd user session for guest and xguest SELinux users
* Fri May 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-18
  - Fix typo in gpg SELinux module
  - Update gpg policy to make ti working with confined users
  - Add domain transition that systemd labeled as init_t can execute spamd_update_exec_t binary to run newly created process as spamd_update_t
  - Remove allow rule for virt_qemu_ga_t to write/append user_tmp_t files
  - Label /var/run/user/*/dbus-1 as session_dbusd_tmp_t
  - Add dac_override capability to namespace_init_t domain
  - Label /usr/sbin/corosync-qdevice as cluster_exec_t
  - Allow NetworkManager_ssh_t domain to open communication channel with system dbus. BZ(1677484)
  - Label /usr/libexec/dnf-utils as debuginfo_exec_t
  - Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on
  - Allow nrpe_t domain to be dbus cliennt
  - Add interface sssd_signull()
  - Label /usr/bin/tshark as wireshark_exec_t
  - Update userdomains to allow confined users to create gpg keys
  - Allow associate all filesystem_types with fs_t
  - Dontaudit syslogd_t using kill in unamespaces BZ(1711122)
  - Allow init_t to manage session_dbusd_tmp_t dirs
  - Allow systemd_gpt_generator_t to read/write to clearance
  - Allow su_domain_type to getattr to /dev/gpmctl
  - Update userdom_login_user_template() template to make working systemd user session for guest and xguest SELinux users
* Fri May 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-17
  - Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on
  - Allow nrpe_t domain to be dbus cliennt
  - Add interface sssd_signull()
  - Label /usr/bin/tshark as wireshark_exec_t
  - Fix typo in dbus_role_template()
  - Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119)
  - Allow userdomains dbus domain to execute dbus broker. BZ(1710113)
  - Allow dovedot_deliver_t setuid/setgid capabilities BZ(1709572)
  - Allow virt domains to access xserver devices BZ(1705685)
  - Allow aide to be executed by systemd with correct (aide_t) domain BZ(1648512)
  - Dontaudit svirt_tcg_t domain to read process state of libvirt BZ(1594598)
  - Allow pcp_pmie_t domain to use fsetid capability BZ(1708082)
  - Allow pcp_pmlogger_t to use setrlimit BZ(1708951)
  - Allow gpsd_t domain to read udev db BZ(1709025)
  - Add sys_ptrace capaiblity for  namespace_init_t domain
  - Allow systemd to execute sa-update in spamd_update_t domain BZ(1705331)
  - Allow rhsmcertd_t domain to read rpm cache files
  - Label /efi same as /boot/efi boot_t BZ(1571962)
  - Allow transition from udev_t to tlp_t BZ(1705246)
  - Remove initrc_exec_t for /usr/sbin/apachectl file
* Fri May 03 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-16
  - Add fcontext for apachectl util to fix missing output when executed "httpd -t" from this script.
* Thu May 02 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-15
  - Allow iscsid_t domain to mmap modules_dep_t files
  - Allow ngaios to use chown capability
  - Dontaudit gpg_domain to create netlink_audit sockets
  - Remove role transition in rpm_run() interface to allow sysadm_r jump to rpm_t type. BZ(1704251)
  - Allow dirsrv_t domain to execute own tmp files BZ(1703111)
  - Update fs_rw_cephfs_files() interface to allow also caller domain to read/write cephpfs_t lnk files
  - Update domain_can_mmap_files() boolean to allow also mmap lnk files
  - Improve userdom interfaces to drop guest_u SELinux user to use nsswitch
* Fri Apr 26 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-14
  - Allow transition from cockpit_session to unpriv user domains
* Thu Apr 25 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-13
  - Introduce deny_bluetooth boolean
  - Allow greylist_milter_t to read network system state BZ(1702672)
  - Allow freeipmi domains to mmap freeipmi_var_cache_t files
  - Allow rhsmcertd_t and rpm_t domains to chat over dbus
  - Allow thumb_t domain to delete cache_home_t files BZ(1701643)
  - Update gnome_role_template() to allow _gkeyringd_t domains to chat with systemd_logind over dbus
  - Add new interface boltd_dbus_chat()
  - Allow fwupd_t and modemmanager_t domains to communicate over dbus BZ(1701791)
  - Allow keepalived_t domain to create and use netlink_connector sockets BZ(1701750)
  - Allow cockpit_ws_t domain to set limits BZ(1701703)
  - Update Nagios policy when sudo is used
  - Deamon rhsmcertd is able to install certs for docker again
  - Introduce deny_bluetooth boolean
  - Don't allow a container to connect to random services
  - Remove file context /usr/share/spamassassin/sa-update\.cron -> bin_t to label sa-update.cron as spamd_update_exec_t.
  - Allow systemd_logind_t and systemd_resolved_t domains to chat over dbus
  - Allow unconfined_t to use bpf tools
  - Allow x_userdomains to communicate with boltd daemon over dbus
* Fri Apr 19 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-12
  - Fix typo in cups SELinux policy
  - Allow iscsid_t to read modules deps BZ(1700245)
  - Allow cups_pdf_t domain to create cupsd_log_t dirs in /var/log BZ(1700442)
  - Allow httpd_rotatelogs_t to execute generic binaries
  - Update system_dbus policy because of dbus-broker-20-2
  - Allow httpd_t doman to read/write /dev/zero device  BZ(1700758)
  - Allow tlp_t domain to read module deps files BZ(1699459)
  - Add file context for /usr/lib/dotnet/dotnet
  - Update dev_rw_zero() interface by adding map permission
  - Allow bounded transition for executing init scripts
* Fri Apr 12 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-11
  - Allow mongod_t domain to lsearch in cgroups BZ(1698743)
  - Allow rngd communication with pcscd BZ(1679217)
  - Create cockpit_tmpfs_t and allow cockpit ws and session to use it BZ(1698405)
  - Fix broken networkmanager interface for allowing manage lib files for dnsmasq_t.
  - Update logging_send_audit_msgs(sudodomain() to control TTY auditing for netlink socket for audit service
* Tue Apr 09 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-10
  - Allow systemd_modules_load to read modules_dep_t files
  - Allow systemd labeled as init_t to setattr on unallocated ttys BZ(1697667)
* Mon Apr 08 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-9
  - Merge #18 `Add check for config file consistency`
  - Allow tlp_t domain also write to nvme_devices block devices BZ(1696943)
  - Fix typo in rhsmcertd SELinux module
  - Allow dnsmasq_t domain to manage NetworkManager_var_lib_t files
  - Allow rhsmcertd_t domain to read yum.log file labeled as rpm_log_t
  - Allow unconfined users to use vsock unlabeled sockets
  - Add interface kernel_rw_unlabeled_vsock_socket()
  - Allow unconfined users to use smc unlabeled sockets
  - Add interface kernel_rw_unlabeled_smc_socket
  - Allow systemd_resolved_t domain to read system network state BZ(1697039)
  - Allow systemd to mounton kernel sysctls BZ(1696201)
  - Add interface kernel_mounton_kernel_sysctl() BZ(1696201)
  - Allow systemd to mounton several systemd direstory to increase security of systemd Resolves: rhbz#1696201
* Fri Apr 05 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-8
  - Allow systemd to mounton several systemd direstory to increase security of systemd
  Resolves: rhbz#1696201
* Wed Apr 03 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-7
  - Allow fontconfig file transition for xguest_u user
  - Add gnome_filetrans_fontconfig_home_content interface
  - Add permissions needed by systemd's machinectl shell/login
  - Update SELinux policy for xen services
  - Add dac_override capability for kdumpctl_t process domain
  - Allow chronyd_t domain to exec shell
  - Fix varnisncsa typo
  - Allow init start freenx-server BZ(1678025)
  - Create logrotate_use_fusefs boolean
  - Add tcpd_wrapped_domain for telnetd BZ(1676940)
  - Allow tcpd bind to services ports BZ(1676940)
  - Update mysql_filetrans_named_content() to allow cluster to create mysql dirs in /var/run with proper label mysqld_var_run_t
  - Make shell_exec_t type as entrypoint for vmtools_unconfined_t.
  - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy-contrib into rawhide
  - Allow virtlogd_t domain to create virt_etc_rw_t files in virt_etc_t
  - Allow esmtp access .esmtprc BZ(1691149)
  - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy-contrib into rawhide
  - Allow tlp_t domain to read nvme block devices BZ(1692154)
  - Add support for smart card authentication in cockpit BZ(1690444)
  - Add permissions needed by systemd's machinectl shell/login
  - Allow kmod_t domain to mmap modules_dep_t files.
  - Allow systemd_machined_t dac_override capability BZ(1670787)
  - Update modutils_read_module_deps_files() interface to also allow mmap module_deps_t files
  - Allow unconfined_domain_type to use bpf tools BZ(1694115)
  - Revert "Allow unconfined_domain_type to use bpf tools BZ(1694115)"
  - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy into rawhide
  - Allow unconfined_domain_type to use bpf tools BZ(1694115)
  - Allow init_t read mnt_t symlinks BZ(1637070)
  - Update dev_filetrans_all_named_dev() interface
  - Allow xdm_t domain to execmod temp files BZ(1686675)
  - Revert "Allow xdm_t domain to create own tmp files BZ(1686675)"
  - Allow getty_t, local_login_t, chkpwd_t and passwd_t to use usbttys. BZ(1691582)
  - Allow confined users labeled as staff_t to run iptables.
  - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy into rawhide
  - Allow xdm_t domain to create own tmp files BZ(1686675)
  - Add miscfiles_dontaudit_map_generic_certs interface.
* Sat Mar 23 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-6
  - Allow boltd_t domain to write to sysfs_t dirs BZ(1689287)
  - Allow fail2ban execute journalctl BZ(1689034)
  - Update sudodomains to make working confined users run sudo/su
  - Introduce new boolean unconfined_dyntrans_all.
  - Allow iptables_t domain to read NetworkManager state BZ(1690881)
* Tue Mar 19 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-5
  - Update xen SELinux module
  - Improve labeling for PCP plugins
  - Allow varnishd_t domain to read sysfs_t files
  - Update vmtools policy
  - Allow virt_qemu_ga_t domain to read udev_var_run_t files
  - Update nagios_run_sudo boolean with few allow rules related to accessing sssd
  - Update file context for modutils rhbz#1689975
  - Label /dev/xen/hypercall and /dev/xen/xenbus_backend as xen_device_t Resolves: rhbz#1679293
  - Grant permissions for onloadfs files of all classes.
  - Allow all domains to send dbus msgs to vmtools_unconfined_t processes
  - Label /dev/pkey as crypt_device_t
  - Allow sudodomains to write to systemd_logind_sessions_t pipes.
  - Label /usr/lib64/libcuda.so.XX.XX library as textrel_shlib_t.
* Tue Mar 12 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-4
  - Update vmtools policy
  - Allow virt_qemu_ga_t domain to read udev_var_run_t files
  - Update nagios_run_sudo boolean with few allow rules related to accessing sssd
  - Update travis CI to install selinux-policy dependencies without checking for gpg check
  - Allow journalctl_t domain to mmap syslogd_var_run_t files
  - Allow smokeping process to mmap own var lib files and allow set process group. Resolves: rhbz#1661046
  - Allow sbd_t domain to bypass permission checks for sending signals
  - Allow sbd_t domain read/write all sysctls
  - Allow kpatch_t domain to communicate with policykit_t domsin over dbus
  - Allow boltd_t to stream connect to sytem dbus
  - Allow zabbix_t domain to create sockets labeled as zabbix_var_run_t BZ(1683820)
  - Allow all domains to send dbus msgs to vmtools_unconfined_t processes
  - Label /dev/pkey as crypt_device_t
  - Allow sudodomains to write to systemd_logind_sessions_t pipes.
  - Label /usr/lib64/libcuda.so.XX.XX library as textrel_shlib_t.
  - Allow ifconfig_t domain to read /dev/random BZ(1687516)
  - Fix interface modutils_run_kmod() where was used old interface modutils_domtrans_insmod instead of new one modutils_domtrans_kmod() Resolves: rhbz#1686660
  - Update travis CI to install selinux-policy dependencies without checking for gpg check
  - Label /usr/sbin/nodm as xdm_exec_t same as other display managers
  - Update userdom_admin_user_template() and init_prog_run_bpf() interfaces to make working bpftool for confined admin
  - Label /usr/sbin/e2mmpstatus as fsadm_exec_t Resolves: rhbz#1684221
  - Update unconfined_dbus_send() interface to allow both direction communication over dbus with unconfined process.
* Wed Feb 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-3
  - Reverting https://src.fedoraproject.org/rpms/selinux-policy/pull-request/15 because "%pretrans" cannot use shell scripts.
  Resolves: rhbz#1683365
* Tue Feb 26 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-2
  - Merge insmod_t, depmod_t and update_modules_t do kmod_t
* Mon Feb 25 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-1
  - Allow openvpn_t domain to set capability BZ(1680276)
  - Update redis_enable_notify() boolean to fix sending e-mail by redis when this boolean is turned on
  - Allow chronyd_t domain to send data over dgram socket
  - Add rolekit_dgram_send() interface
  - Fix bug in userdom_restricted_xwindows_user_template() template to disallow all user domains to access admin_home_t - kernel/files.fc: Label /var/run/motd.d(./*)? and /var/run/motd as pam_var_run_t
* Thu Feb 14 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-22
  - Allow dovecot_t domain to connect to mysql db
  - Add dac_override capability for sbd_t SELinux domain
  - Add dac_override capability for  spamd_update_t domain
  - Allow nnp transition for domains fsadm_t, lvm_t and mount_t - Add fs_manage_fusefs_named_pipes interface
* Tue Feb 12 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-21
  - Allow glusterd_t to write to automount unnamed pipe Resolves: rhbz#1674243
  - Allow ddclient_t to setcap Resolves: rhbz#1674298
  - Add dac_override capability to vpnc_t domain
  - Add dac_override capability to spamd_t domain
  - Allow ibacm_t domain to read system state and label all ibacm sockets and symlinks as ibacm_var_run_t in /var/run
  - Allow read network state of system for processes labeled as ibacm_t
  - Allow ibacm_t domain to send dgram sockets to kernel processes
  - Allow dovecot_t to connect to MySQL UNIX socket
  - Fix CI for use on forks
  - Fix typo bug in sensord policy
  - Update ibacm_t policy after testing lastest version of this component
  - Allow sensord_t domain to mmap own log files
  - Allow virt_doamin to read/write dev device
  - Add dac_override capability for ipa_helper_t
  - Update policy with multiple allow rules to make working installing VM in MLS policy
  - Allow syslogd_t domain to send null signal to all domains on system Resolves: rhbz#1673847 - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy into rawhide - Allow systemd-logind daemon to remove shared memory during logout Resolves: rhbz#1674172 - Always label /home symlinks as home_root_t - Update mount_read_pid_files macro to allow also list mount_var_run_t dirs - Fix typo bug in userdomain SELinux policy - Merge branch 'rawhide' of github.com:fedora-selinux/selinux-policy into rawhide - Allow user domains to stop systemd user sessions during logout process - Fix CI for use on forks - Label /dev/sev char device as sev_device_t - Add s_manage_fusefs_named_sockets interface - Allow systemd-journald to receive messages including a memfd
* Sat Feb 02 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-20
  - Allow sensord_t domain to use nsswitch and execute shell
  - Allow opafm_t domain to execute lib_t files
  - Allow opafm_t domain to manage kdump_crash_t files and dirs
  - Allow virt domains to read/write cephfs filesystems
  - Allow virtual machine to write to fixed_disk_device_t
  - Update kdump_manage_crash() interface to allow also manage dirs by caller domain Resolves: rhbz#1491585
  - Allow svnserve_t domain to create in /tmp svn_0 file labeled as krb5_host_rcache_t
  - Allow vhostmd_t read libvirt configuration files
  - Update dbus_role_template interface to allow userdomains to accept data from userdomain dbus domains
  - Add miscfiles_filetrans_named_content_letsencrypt() to optional_block - Allow unconfined domains to create letsencrypt directory in /var/lib labeled as cert_t - Allow staff_t user to systemctl iptables units. - Allow systemd to read selinux logind config - obj_perm_sets.spt: Add xdp_socket to socket_class_set. - Add xdp_socket security class and access vectors - Allow transition from init_t domain to user_t domain during ssh login with confined user user_u
* Tue Jan 29 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-19
  - Add new xdp_socket class
  - Update dbus_role_template interface to allow userdomains to accept data from userdomain dbus domains
  - Allow boltd_t domain to read cache_home_t files BZ(1669911)
  - Allow winbind_t domain to check for existence of processes labeled as systemd_hostnamed_t BZ(1669912)
  - Allow gpg_agent_t to create own tmpfs dirs and sockets
  - Allow openvpn_t domain to manage vpnc pidfiles BZ(1667572)
  - Add multiple interfaces for vpnc interface file
  - Label /var/run/fcgiwrap dir as httpd_var_run_t BZ(1655702)
  - In MongoDB 3.4.16, 3.6.6, 4.0.0 and later, mongod reads netstat info from proc and stores it in its diagnostic system (FTDC). See: https://jira.mongodb.org/browse/SERVER-31400 This means that we need to adjust the policy so that the mongod process is allowed to open and read /proc/net/netstat, which typically has symlinks (e.g. /proc/net/snmp).
  - Allow gssd_t domain to manage kernel keyrings of every domain.
  - Revert "Allow gssd_t domain to read/write kernel keyrings of every domain."
  - Allow plymouthd_t search efivarfs directory BZ(1664143)
* Tue Jan 15 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-18
  - Allow plymouthd_t search efivarfs directory BZ(1664143)
  - Allow arpwatch send e-mail notifications BZ(1657327)
  - Allow tangd_t domain to bind on tcp ports labeled as tangd_port_t
  - Allow gssd_t domain to read/write kernel keyrings of every domain.
  - Allow systemd_timedated_t domain nnp_transition BZ(1666222)
  - Add the fs_search_efivarfs_dir interface
  - Create tangd_port_t with default label tcp/7406
  - Add interface domain_rw_all_domains_keyrings()
  - Some of the selinux-policy macros doesn't work in chroots/initial installs. BZ(1665643)
* Fri Jan 11 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-17
  - Allow staff_t domain to read read_binfmt_misc filesystem
  - Add interface fs_read_binfmt_misc()
  - Revert "Allow staff_t to rw binfmt_misc_fs_t files BZ(1658975)"
* Fri Jan 11 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-16
  - Allow sensord_t to execute own binary files
  - Allow pcp_pmlogger_t domain to getattr all filesystem BZ(1662432)
  - Allow virtd_lxc_t domains use BPF BZ(1662613)
  - Allow openvpn_t domain to read systemd state BZ(1661065)
  - Dontaudit ptrace all domains for blueman_t BZ(1653671)
  - Used correct renamed interface for imapd_t domain
  - Change label of /usr/libexec/lm_sensors/sensord-service-wrapper from lsmd_exec_t to sensord_exec_t BZ(1662922)
  - Allow hddtemp_t domain to read nvme block devices BZ(1663579)
  - Add dac_override capability to spamd_t domain BZ(1645667)
  - Allow pcp_pmlogger_t to mount tracefs_t filesystem BZ(1662983)
  - Allow pcp_pmlogger_t domain to read al sysctls BZ(1662441)
  - Specify recipients that will be notified about build CI results.
  - Allow saslauthd_t domain to mmap own pid files BZ(1653024)
  - Add dac_override capability for snapperd_t domain BZ(1619356)
  - Make kpatch_t domain application domain to allow users to execute kpatch in kpatch_t domain.
  - Add ipc_owner capability to pcp_pmcd_t domain BZ(1655282)
  - Update pulseaudio_stream_connect() to allow caller domain create stream sockets to cumminicate with pulseaudio
  - Allow pcp_pmlogger_t domain to send signals to rpm_script_t BZ(1651030)
  - Add new interface: rpm_script_signal()
  - Allow init_t domain to mmap init_var_lib_t files and dontaudit leaked fd. BZ(1651008)
  - Make workin: systemd-run --system --pty bash BZ(1647162)
  - Allow ipsec_t domain dbus chat with systemd_resolved_t BZ(1662443)
  - Allow staff_t to rw binfmt_misc_fs_t files BZ(1658975)
  - Specify recipients that will be notified about build CI results.
  - Label /usr/lib/systemd/user as systemd_unit_file_t BZ(1652814)
  - Allow sysadm_t,staff_t and unconfined_t domain to execute kpatch as kpatch_t domain
  - Add rules to allow systemd to mounton systemd_timedated_var_lib_t.
  - Allow x_userdomains to stream connect to pulseaudio BZ(1658286)
* Sun Dec 16 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-15
  - Add macro-expander script to selinux-policy-devel package
* Thu Dec 06 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-14
  - Remove all ganesha bits from gluster and rpc policy
  - Label /usr/share/spamassassin/sa-update.cron as spamd_update_exec_t
  - Add dac_override capability to ssad_t domains
  - Allow pesign_t domain to read gnome home configs
  - Label /usr/libexec/lm_sensors/sensord-service-wrapper as lsmd_exec_t
  - Allow rngd_t domains read kernel state
  - Allow certmonger_t domains to read bind cache
  - Allow ypbind_t domain to stream connect to sssd
  - Allow rngd_t domain to setsched
  - Allow sanlock_t domain to read/write sysfs_t files
  - Add dac_override capability to postfix_local_t domain
  - Allow ypbind_t to search sssd_var_lib_t dirs
  - Allow virt_qemu_ga_t domain to write to user_tmp_t files
  - Allow systemd_logind_t to dbus chat with virt_qemu_ga_t
  - Update sssd_manage_lib_files() interface to allow also mmap sssd_var_lib_t files
  - Add new interface sssd_signal()
  - Update xserver_filetrans_home_content() and xserver_filetrans_admin_home_content() unterfaces to allow caller domain to create .vnc dir in users homedir labeled as xdm_home_t
  - Update logging_filetrans_named_content() to allow caller domains of this interface to create /var/log/journal/remote directory labeled as var_log_t
  - Add sys_resource capability to the systemd_passwd_agent_t domain
  - Allow ipsec_t domains to read bind cache
  - kernel/files.fc: Label /run/motd as etc_t
  - Allow systemd to stream connect to userdomain processes
  - Label /var/lib/private/systemd/ as init_var_lib_t
  - Allow initrc_t domain to create new socket labeled as init_T
  - Allow audisp_remote_t domain remote logging client to read local audit events from relevant socket.
  - Add tracefs_t type to mountpoint attribute
  - Allow useradd_t and groupadd_t domains to send signals to sssd_t
  - Allow systemd_logind_t domain to remove directories labeled as tmpfs_t BZ(1648636)
  - Allow useradd_t and groupadd_t domains to access sssd files because of the new feature in shadow-utils
* Wed Nov 07 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-13
  - Update pesign policy to allow pesign_t domain to read bind cache files/dirs
  - Add dac_override capability to mdadm_t domain
  - Create ibacm_tmpfs_t type for the ibacm policy
  - Dontaudit capability sys_admin for dhcpd_t domain
  - Makes rhsmcertd_t domain an exception to the constraint preventing changing the user identity in object contexts.
  - Allow abrt_t domain to mmap generic tmp_t files
  - Label /usr/sbin/wpa_cli as wpa_cli_exec_t
  - Allow sandbox_xserver_t domain write to user_tmp_t files
  - Allow certutil running as ipsec_mgmt_t domain to mmap ipsec_mgmt pid files Dontaudit ipsec_mgmt_t domain to write to the all mountpoints
  - Add interface files_map_generic_tmp_files()
  - Add dac_override capability to the syslogd_t domain
  - Create systemd_timedated_var_run_t label
  - Update systemd_timedated_t domain to allow create own pid files/access init_var_lib_t files and read dbus files BZ(1646202)
  - Add init_read_var_lib_lnk_files and init_read_var_lib_sock_files interfaces
* Sun Nov 04 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-12
  - Dontaudit thumb_t domain to setattr on lib_t dirs BZ(1643672)
  - Dontaudit cupsd_t domain to setattr lib_t dirs BZ(1636766)
  - Add dac_override capability to postgrey_t domain BZ(1638954)
  - Allow thumb_t domain to execute own tmpfs files BZ(1643698)
  - Allow xdm_t domain to manage dosfs_t files BZ(1645770)
  - Label systemd-timesyncd binary as systemd_timedated_exec_t to make it run in systemd_timedated_t domain BZ(1640801)
  - Improve fs_manage_ecryptfs_files to allow caller domain also mmap ecryptfs_t files BZ(1630675)
  - Label systemd-user-runtime-dir binary as systemd_logind_exec_t BZ(1644313)
* Sun Nov 04 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-11
  - Add nnp transition rule for vnstatd_t domain using NoNewPrivileges systemd feature BZ(1643063)
  - Allow l2tpd_t domain to mmap /etc/passwd file BZ(1638948)
  - Add dac_override capability to ftpd_t domain
  - Allow gpg_t to create own tmpfs dirs and sockets
  - Allow rhsmcertd_t domain to relabel cert_t files
  - Add SELinux policy for kpatch
  - Allow nova_t domain to use pam
  - sysstat: grant sysstat_t the search_dir_perms set
  - Label systemd-user-runtime-dir binary as systemd_logind_exec_t BZ(1644313)
  - Allow systemd_logind_t to read fixed dist device BZ(1645631)
  - Allow systemd_logind_t domain to read nvme devices BZ(1645567)
  - Allow systemd_rfkill_t domain to comunicate via dgram sockets with syslogd BZ(1638981)
  - kernel/files.fc: Label /run/motd.d(/.*)? as etc_t
  - Allow ipsec_mgmt_t process to send signals other than SIGKILL, SIGSTOP, or SIGCHLD to the ipsec_t domains BZ(1638949)
  - Allow X display manager to check status and reload services which are part of x_domain attribute
  - Add interface miscfiles_relabel_generic_cert()
  - Make kpatch policy active
  - Fix userdom_write_user_tmp_dirs() to allow caller domain also read/write user_tmp_t dirs
  - Dontaudit sys_admin capability for netutils_t domain
  - Label tcp and udp ports 2611 as qpasa_agent_port_t
* Tue Oct 16 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-10
  - Allow boltd_t domain to dbus chat with fwupd_t domain BZ(1633786)
* Mon Oct 15 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-9
  - Allow caller domains using cron_*_role to have entrypoint permission on system_cron_spool_t files BZ(1625645)
  - Add interface cron_system_spool_entrypoint()
  - Bolt added d-bus API for force-powering the thunderbolt controller, so system-dbusd needs acces to boltd pipes BZ(1637676)
  - Add interfaces for boltd SELinux module
  - Add dac_override capability to modemmanager_t domain BZ(1636608)
  - Allow systemd to mount boltd_var_run_t dirs BZ(1636823)
  - Label correctly /var/named/chroot*/dev/unrandom in bind chroot.
* Sat Oct 13 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-8
  - ejabberd SELinux module removed, it's shipped by ejabberd-selinux package
* Sat Oct 13 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-7
  - Update rpm macros for selinux policy from sources repository: https://github.com/fedora-selinux/selinux-policy-macros
* Tue Oct 09 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-6
  - Allow boltd_t to be activated by init socket activation
  - Allow virt_domain to read/write to virtd_t unix_stream socket because of new version of libvirt 4.4. BZ(1635803)
  - Update SELinux policy for libreswan based on the latest rebase 3.26
  - Fix typo in init_named_socket_activation interface
* Thu Oct 04 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-5
  - Allow dictd_t domain to mmap dictd_var_lib_t files BZ(1634650)
  - Fix typo in boltd.te policy
  - Allow fail2ban_t domain to mmap journal
  - Add kill capability to named_t domain
  - Allow neutron domain to read/write /var/run/utmp
  - Create boltd_var_run_t type for boltd pid files
  - Allow tomcat_domain to read /dev/random
  - Allow neutron_t domain to use pam
  - Add the port used by nsca (Nagios Service Check Acceptor)

Files

/usr/share/doc/selinux-policy
/usr/share/doc/selinux-policy/Makefile.example
/usr/share/doc/selinux-policy/example.fc
/usr/share/doc/selinux-policy/example.if
/usr/share/doc/selinux-policy/example.te
/usr/share/doc/selinux-policy/html
/usr/share/doc/selinux-policy/html/admin.html
/usr/share/doc/selinux-policy/html/admin_bootloader.html
/usr/share/doc/selinux-policy/html/admin_consoletype.html
/usr/share/doc/selinux-policy/html/admin_dmesg.html
/usr/share/doc/selinux-policy/html/admin_netutils.html
/usr/share/doc/selinux-policy/html/admin_su.html
/usr/share/doc/selinux-policy/html/admin_sudo.html
/usr/share/doc/selinux-policy/html/admin_usermanage.html
/usr/share/doc/selinux-policy/html/apps.html
/usr/share/doc/selinux-policy/html/apps_seunshare.html
/usr/share/doc/selinux-policy/html/booleans.html
/usr/share/doc/selinux-policy/html/contrib.html
/usr/share/doc/selinux-policy/html/contrib_abrt.html
/usr/share/doc/selinux-policy/html/contrib_accountsd.html
/usr/share/doc/selinux-policy/html/contrib_acct.html
/usr/share/doc/selinux-policy/html/contrib_ada.html
/usr/share/doc/selinux-policy/html/contrib_afs.html
/usr/share/doc/selinux-policy/html/contrib_aiccu.html
/usr/share/doc/selinux-policy/html/contrib_aide.html
/usr/share/doc/selinux-policy/html/contrib_aisexec.html
/usr/share/doc/selinux-policy/html/contrib_ajaxterm.html
/usr/share/doc/selinux-policy/html/contrib_alsa.html
/usr/share/doc/selinux-policy/html/contrib_amanda.html
/usr/share/doc/selinux-policy/html/contrib_amavis.html
/usr/share/doc/selinux-policy/html/contrib_amtu.html
/usr/share/doc/selinux-policy/html/contrib_anaconda.html
/usr/share/doc/selinux-policy/html/contrib_antivirus.html
/usr/share/doc/selinux-policy/html/contrib_apache.html
/usr/share/doc/selinux-policy/html/contrib_apcupsd.html
/usr/share/doc/selinux-policy/html/contrib_apm.html
/usr/share/doc/selinux-policy/html/contrib_apt.html
/usr/share/doc/selinux-policy/html/contrib_arpwatch.html
/usr/share/doc/selinux-policy/html/contrib_asterisk.html
/usr/share/doc/selinux-policy/html/contrib_authbind.html
/usr/share/doc/selinux-policy/html/contrib_authconfig.html
/usr/share/doc/selinux-policy/html/contrib_automount.html
/usr/share/doc/selinux-policy/html/contrib_avahi.html
/usr/share/doc/selinux-policy/html/contrib_awstats.html
/usr/share/doc/selinux-policy/html/contrib_backup.html
/usr/share/doc/selinux-policy/html/contrib_bacula.html
/usr/share/doc/selinux-policy/html/contrib_bcfg2.html
/usr/share/doc/selinux-policy/html/contrib_bind.html
/usr/share/doc/selinux-policy/html/contrib_bird.html
/usr/share/doc/selinux-policy/html/contrib_bitlbee.html
/usr/share/doc/selinux-policy/html/contrib_blkmapd.html
/usr/share/doc/selinux-policy/html/contrib_blueman.html
/usr/share/doc/selinux-policy/html/contrib_bluetooth.html
/usr/share/doc/selinux-policy/html/contrib_boinc.html
/usr/share/doc/selinux-policy/html/contrib_boltd.html
/usr/share/doc/selinux-policy/html/contrib_brctl.html
/usr/share/doc/selinux-policy/html/contrib_brltty.html
/usr/share/doc/selinux-policy/html/contrib_bugzilla.html
/usr/share/doc/selinux-policy/html/contrib_bumblebee.html
/usr/share/doc/selinux-policy/html/contrib_cachefilesd.html
/usr/share/doc/selinux-policy/html/contrib_calamaris.html
/usr/share/doc/selinux-policy/html/contrib_callweaver.html
/usr/share/doc/selinux-policy/html/contrib_canna.html
/usr/share/doc/selinux-policy/html/contrib_ccs.html
/usr/share/doc/selinux-policy/html/contrib_cdrecord.html
/usr/share/doc/selinux-policy/html/contrib_certmaster.html
/usr/share/doc/selinux-policy/html/contrib_certmonger.html
/usr/share/doc/selinux-policy/html/contrib_certwatch.html
/usr/share/doc/selinux-policy/html/contrib_cfengine.html
/usr/share/doc/selinux-policy/html/contrib_cgdcbxd.html
/usr/share/doc/selinux-policy/html/contrib_cgroup.html
/usr/share/doc/selinux-policy/html/contrib_chrome.html
/usr/share/doc/selinux-policy/html/contrib_chronyd.html
/usr/share/doc/selinux-policy/html/contrib_cinder.html
/usr/share/doc/selinux-policy/html/contrib_cipe.html
/usr/share/doc/selinux-policy/html/contrib_clamav.html
/usr/share/doc/selinux-policy/html/contrib_clockspeed.html
/usr/share/doc/selinux-policy/html/contrib_clogd.html
/usr/share/doc/selinux-policy/html/contrib_cloudform.html
/usr/share/doc/selinux-policy/html/contrib_cmirrord.html
/usr/share/doc/selinux-policy/html/contrib_cobbler.html
/usr/share/doc/selinux-policy/html/contrib_cockpit.html
/usr/share/doc/selinux-policy/html/contrib_collectd.html
/usr/share/doc/selinux-policy/html/contrib_colord.html
/usr/share/doc/selinux-policy/html/contrib_comsat.html
/usr/share/doc/selinux-policy/html/contrib_condor.html
/usr/share/doc/selinux-policy/html/contrib_conman.html
/usr/share/doc/selinux-policy/html/contrib_conntrackd.html
/usr/share/doc/selinux-policy/html/contrib_consolekit.html
/usr/share/doc/selinux-policy/html/contrib_container.html
/usr/share/doc/selinux-policy/html/contrib_corosync.html
/usr/share/doc/selinux-policy/html/contrib_couchdb.html
/usr/share/doc/selinux-policy/html/contrib_courier.html
/usr/share/doc/selinux-policy/html/contrib_cpucontrol.html
/usr/share/doc/selinux-policy/html/contrib_cpufreqselector.html
/usr/share/doc/selinux-policy/html/contrib_cpuplug.html
/usr/share/doc/selinux-policy/html/contrib_cron.html
/usr/share/doc/selinux-policy/html/contrib_ctdb.html
/usr/share/doc/selinux-policy/html/contrib_cups.html
/usr/share/doc/selinux-policy/html/contrib_cvs.html
/usr/share/doc/selinux-policy/html/contrib_cyphesis.html
/usr/share/doc/selinux-policy/html/contrib_cyrus.html
/usr/share/doc/selinux-policy/html/contrib_daemontools.html
/usr/share/doc/selinux-policy/html/contrib_dante.html
/usr/share/doc/selinux-policy/html/contrib_dbadm.html
/usr/share/doc/selinux-policy/html/contrib_dbskk.html
/usr/share/doc/selinux-policy/html/contrib_dbus.html
/usr/share/doc/selinux-policy/html/contrib_dcc.html
/usr/share/doc/selinux-policy/html/contrib_ddclient.html
/usr/share/doc/selinux-policy/html/contrib_ddcprobe.html
/usr/share/doc/selinux-policy/html/contrib_denyhosts.html
/usr/share/doc/selinux-policy/html/contrib_devicekit.html
/usr/share/doc/selinux-policy/html/contrib_dhcp.html
/usr/share/doc/selinux-policy/html/contrib_dictd.html
/usr/share/doc/selinux-policy/html/contrib_dirmngr.html
/usr/share/doc/selinux-policy/html/contrib_dirsrv-admin.html
/usr/share/doc/selinux-policy/html/contrib_dirsrv.html
/usr/share/doc/selinux-policy/html/contrib_distcc.html
/usr/share/doc/selinux-policy/html/contrib_djbdns.html
/usr/share/doc/selinux-policy/html/contrib_dkim.html
/usr/share/doc/selinux-policy/html/contrib_dmidecode.html
/usr/share/doc/selinux-policy/html/contrib_dnsmasq.html
/usr/share/doc/selinux-policy/html/contrib_dnssec.html
/usr/share/doc/selinux-policy/html/contrib_dnssectrigger.html
/usr/share/doc/selinux-policy/html/contrib_dovecot.html
/usr/share/doc/selinux-policy/html/contrib_dpkg.html
/usr/share/doc/selinux-policy/html/contrib_drbd.html
/usr/share/doc/selinux-policy/html/contrib_dspam.html
/usr/share/doc/selinux-policy/html/contrib_entropyd.html
/usr/share/doc/selinux-policy/html/contrib_etcd.html
/usr/share/doc/selinux-policy/html/contrib_evolution.html
/usr/share/doc/selinux-policy/html/contrib_exim.html
/usr/share/doc/selinux-policy/html/contrib_fail2ban.html
/usr/share/doc/selinux-policy/html/contrib_fcoe.html
/usr/share/doc/selinux-policy/html/contrib_fetchmail.html
/usr/share/doc/selinux-policy/html/contrib_finger.html
/usr/share/doc/selinux-policy/html/contrib_firewalld.html
/usr/share/doc/selinux-policy/html/contrib_firewallgui.html
/usr/share/doc/selinux-policy/html/contrib_firstboot.html
/usr/share/doc/selinux-policy/html/contrib_fprintd.html
/usr/share/doc/selinux-policy/html/contrib_freeipmi.html
/usr/share/doc/selinux-policy/html/contrib_freqset.html
/usr/share/doc/selinux-policy/html/contrib_ftp.html
/usr/share/doc/selinux-policy/html/contrib_fwupd.html
/usr/share/doc/selinux-policy/html/contrib_games.html
/usr/share/doc/selinux-policy/html/contrib_gatekeeper.html
/usr/share/doc/selinux-policy/html/contrib_gdomap.html
/usr/share/doc/selinux-policy/html/contrib_gear.html
/usr/share/doc/selinux-policy/html/contrib_geoclue.html
/usr/share/doc/selinux-policy/html/contrib_gift.html
/usr/share/doc/selinux-policy/html/contrib_git.html
/usr/share/doc/selinux-policy/html/contrib_gitosis.html
/usr/share/doc/selinux-policy/html/contrib_glance.html
/usr/share/doc/selinux-policy/html/contrib_glusterd.html
/usr/share/doc/selinux-policy/html/contrib_gnome.html
/usr/share/doc/selinux-policy/html/contrib_gnomeclock.html
/usr/share/doc/selinux-policy/html/contrib_gpg.html
/usr/share/doc/selinux-policy/html/contrib_gpm.html
/usr/share/doc/selinux-policy/html/contrib_gpsd.html
/usr/share/doc/selinux-policy/html/contrib_gssproxy.html
/usr/share/doc/selinux-policy/html/contrib_guest.html
/usr/share/doc/selinux-policy/html/contrib_hadoop.html
/usr/share/doc/selinux-policy/html/contrib_hal.html
/usr/share/doc/selinux-policy/html/contrib_hddtemp.html
/usr/share/doc/selinux-policy/html/contrib_hostapd.html
/usr/share/doc/selinux-policy/html/contrib_howl.html
/usr/share/doc/selinux-policy/html/contrib_hsqldb.html
/usr/share/doc/selinux-policy/html/contrib_hwloc.html
/usr/share/doc/selinux-policy/html/contrib_hypervkvp.html
/usr/share/doc/selinux-policy/html/contrib_i18n_input.html
/usr/share/doc/selinux-policy/html/contrib_ibacm.html
/usr/share/doc/selinux-policy/html/contrib_icecast.html
/usr/share/doc/selinux-policy/html/contrib_ifplugd.html
/usr/share/doc/selinux-policy/html/contrib_imaze.html
/usr/share/doc/selinux-policy/html/contrib_inetd.html
/usr/share/doc/selinux-policy/html/contrib_inn.html
/usr/share/doc/selinux-policy/html/contrib_iodine.html
/usr/share/doc/selinux-policy/html/contrib_iotop.html
/usr/share/doc/selinux-policy/html/contrib_ipa.html
/usr/share/doc/selinux-policy/html/contrib_ipmievd.html
/usr/share/doc/selinux-policy/html/contrib_irc.html
/usr/share/doc/selinux-policy/html/contrib_ircd.html
/usr/share/doc/selinux-policy/html/contrib_irqbalance.html
/usr/share/doc/selinux-policy/html/contrib_iscsi.html
/usr/share/doc/selinux-policy/html/contrib_isns.html
/usr/share/doc/selinux-policy/html/contrib_jabber.html
/usr/share/doc/selinux-policy/html/contrib_java.html
/usr/share/doc/selinux-policy/html/contrib_jetty.html
/usr/share/doc/selinux-policy/html/contrib_jockey.html
/usr/share/doc/selinux-policy/html/contrib_journalctl.html
/usr/share/doc/selinux-policy/html/contrib_kde.html
/usr/share/doc/selinux-policy/html/contrib_kdump.html
/usr/share/doc/selinux-policy/html/contrib_kdumpgui.html
/usr/share/doc/selinux-policy/html/contrib_keepalived.html
/usr/share/doc/selinux-policy/html/contrib_kerberos.html
/usr/share/doc/selinux-policy/html/contrib_kerneloops.html
/usr/share/doc/selinux-policy/html/contrib_keyboardd.html
/usr/share/doc/selinux-policy/html/contrib_keystone.html
/usr/share/doc/selinux-policy/html/contrib_kismet.html
/usr/share/doc/selinux-policy/html/contrib_kmscon.html
/usr/share/doc/selinux-policy/html/contrib_kpatch.html
/usr/share/doc/selinux-policy/html/contrib_ksmtuned.html
/usr/share/doc/selinux-policy/html/contrib_ktalk.html
/usr/share/doc/selinux-policy/html/contrib_kubernetes.html
/usr/share/doc/selinux-policy/html/contrib_kudzu.html
/usr/share/doc/selinux-policy/html/contrib_l2tp.html
/usr/share/doc/selinux-policy/html/contrib_ldap.html
/usr/share/doc/selinux-policy/html/contrib_lightsquid.html
/usr/share/doc/selinux-policy/html/contrib_likewise.html
/usr/share/doc/selinux-policy/html/contrib_linuxptp.html
/usr/share/doc/selinux-policy/html/contrib_lircd.html
/usr/share/doc/selinux-policy/html/contrib_livecd.html
/usr/share/doc/selinux-policy/html/contrib_lldpad.html
/usr/share/doc/selinux-policy/html/contrib_loadkeys.html
/usr/share/doc/selinux-policy/html/contrib_lockdev.html
/usr/share/doc/selinux-policy/html/contrib_logrotate.html
/usr/share/doc/selinux-policy/html/contrib_logwatch.html
/usr/share/doc/selinux-policy/html/contrib_lpd.html
/usr/share/doc/selinux-policy/html/contrib_lsm.html
/usr/share/doc/selinux-policy/html/contrib_lttng-tools.html
/usr/share/doc/selinux-policy/html/contrib_mailman.html
/usr/share/doc/selinux-policy/html/contrib_mailscanner.html
/usr/share/doc/selinux-policy/html/contrib_man2html.html
/usr/share/doc/selinux-policy/html/contrib_mandb.html
/usr/share/doc/selinux-policy/html/contrib_mcelog.html
/usr/share/doc/selinux-policy/html/contrib_mcollective.html
/usr/share/doc/selinux-policy/html/contrib_mediawiki.html
/usr/share/doc/selinux-policy/html/contrib_memcached.html
/usr/share/doc/selinux-policy/html/contrib_milter.html
/usr/share/doc/selinux-policy/html/contrib_minidlna.html
/usr/share/doc/selinux-policy/html/contrib_minissdpd.html
/usr/share/doc/selinux-policy/html/contrib_mip6d.html
/usr/share/doc/selinux-policy/html/contrib_mirrormanager.html
/usr/share/doc/selinux-policy/html/contrib_mock.html
/usr/share/doc/selinux-policy/html/contrib_modemmanager.html
/usr/share/doc/selinux-policy/html/contrib_mojomojo.html
/usr/share/doc/selinux-policy/html/contrib_mon_statd.html
/usr/share/doc/selinux-policy/html/contrib_mongodb.html
/usr/share/doc/selinux-policy/html/contrib_mono.html
/usr/share/doc/selinux-policy/html/contrib_monop.html
/usr/share/doc/selinux-policy/html/contrib_motion.html
/usr/share/doc/selinux-policy/html/contrib_mozilla.html
/usr/share/doc/selinux-policy/html/contrib_mpd.html
/usr/share/doc/selinux-policy/html/contrib_mplayer.html
/usr/share/doc/selinux-policy/html/contrib_mrtg.html
/usr/share/doc/selinux-policy/html/contrib_mta.html
/usr/share/doc/selinux-policy/html/contrib_munin.html
/usr/share/doc/selinux-policy/html/contrib_mysql.html
/usr/share/doc/selinux-policy/html/contrib_mythtv.html
/usr/share/doc/selinux-policy/html/contrib_naemon.html
/usr/share/doc/selinux-policy/html/contrib_nagios.html
/usr/share/doc/selinux-policy/html/contrib_namespace.html
/usr/share/doc/selinux-policy/html/contrib_ncftool.html
/usr/share/doc/selinux-policy/html/contrib_nessus.html
/usr/share/doc/selinux-policy/html/contrib_networkmanager.html
/usr/share/doc/selinux-policy/html/contrib_ninfod.html
/usr/share/doc/selinux-policy/html/contrib_nis.html
/usr/share/doc/selinux-policy/html/contrib_nova.html
/usr/share/doc/selinux-policy/html/contrib_nscd.html
/usr/share/doc/selinux-policy/html/contrib_nsd.html
/usr/share/doc/selinux-policy/html/contrib_nslcd.html
/usr/share/doc/selinux-policy/html/contrib_nsplugin.html
/usr/share/doc/selinux-policy/html/contrib_ntop.html
/usr/share/doc/selinux-policy/html/contrib_ntp.html
/usr/share/doc/selinux-policy/html/contrib_numad.html
/usr/share/doc/selinux-policy/html/contrib_nut.html
/usr/share/doc/selinux-policy/html/contrib_nx.html
/usr/share/doc/selinux-policy/html/contrib_oav.html
/usr/share/doc/selinux-policy/html/contrib_obex.html
/usr/share/doc/selinux-policy/html/contrib_oddjob.html
/usr/share/doc/selinux-policy/html/contrib_oident.html
/usr/share/doc/selinux-policy/html/contrib_opafm.html
/usr/share/doc/selinux-policy/html/contrib_openca.html
/usr/share/doc/selinux-policy/html/contrib_openct.html
/usr/share/doc/selinux-policy/html/contrib_opendnssec.html
/usr/share/doc/selinux-policy/html/contrib_openfortivpn.html
/usr/share/doc/selinux-policy/html/contrib_openhpi.html
/usr/share/doc/selinux-policy/html/contrib_openhpid.html
/usr/share/doc/selinux-policy/html/contrib_openshift-origin.html
/usr/share/doc/selinux-policy/html/contrib_openshift.html
/usr/share/doc/selinux-policy/html/contrib_opensm.html
/usr/share/doc/selinux-policy/html/contrib_openvpn.html
/usr/share/doc/selinux-policy/html/contrib_openvswitch.html
/usr/share/doc/selinux-policy/html/contrib_openwsman.html
/usr/share/doc/selinux-policy/html/contrib_oracleasm.html
/usr/share/doc/selinux-policy/html/contrib_osad.html
/usr/share/doc/selinux-policy/html/contrib_pacemaker.html
/usr/share/doc/selinux-policy/html/contrib_pads.html
/usr/share/doc/selinux-policy/html/contrib_passenger.html
/usr/share/doc/selinux-policy/html/contrib_pcmcia.html
/usr/share/doc/selinux-policy/html/contrib_pcp.html
/usr/share/doc/selinux-policy/html/contrib_pcscd.html
/usr/share/doc/selinux-policy/html/contrib_pdns.html
/usr/share/doc/selinux-policy/html/contrib_pegasus.html
/usr/share/doc/selinux-policy/html/contrib_perdition.html
/usr/share/doc/selinux-policy/html/contrib_pesign.html
/usr/share/doc/selinux-policy/html/contrib_pingd.html
/usr/share/doc/selinux-policy/html/contrib_piranha.html
/usr/share/doc/selinux-policy/html/contrib_pkcs.html
/usr/share/doc/selinux-policy/html/contrib_pkcs11proxyd.html
/usr/share/doc/selinux-policy/html/contrib_pki.html
/usr/share/doc/selinux-policy/html/contrib_plymouthd.html
/usr/share/doc/selinux-policy/html/contrib_podsleuth.html
/usr/share/doc/selinux-policy/html/contrib_policykit.html
/usr/share/doc/selinux-policy/html/contrib_polipo.html
/usr/share/doc/selinux-policy/html/contrib_portage.html
/usr/share/doc/selinux-policy/html/contrib_portmap.html
/usr/share/doc/selinux-policy/html/contrib_portreserve.html
/usr/share/doc/selinux-policy/html/contrib_portslave.html
/usr/share/doc/selinux-policy/html/contrib_postfix.html
/usr/share/doc/selinux-policy/html/contrib_postfixpolicyd.html
/usr/share/doc/selinux-policy/html/contrib_postgrey.html
/usr/share/doc/selinux-policy/html/contrib_ppp.html
/usr/share/doc/selinux-policy/html/contrib_prelink.html
/usr/share/doc/selinux-policy/html/contrib_prelude.html
/usr/share/doc/selinux-policy/html/contrib_privoxy.html
/usr/share/doc/selinux-policy/html/contrib_procmail.html
/usr/share/doc/selinux-policy/html/contrib_prosody.html
/usr/share/doc/selinux-policy/html/contrib_psad.html
/usr/share/doc/selinux-policy/html/contrib_ptchown.html
/usr/share/doc/selinux-policy/html/contrib_publicfile.html
/usr/share/doc/selinux-policy/html/contrib_pulseaudio.html
/usr/share/doc/selinux-policy/html/contrib_puppet.html
/usr/share/doc/selinux-policy/html/contrib_pwauth.html
/usr/share/doc/selinux-policy/html/contrib_pxe.html
/usr/share/doc/selinux-policy/html/contrib_pyzor.html
/usr/share/doc/selinux-policy/html/contrib_qemu.html
/usr/share/doc/selinux-policy/html/contrib_qmail.html
/usr/share/doc/selinux-policy/html/contrib_qpid.html
/usr/share/doc/selinux-policy/html/contrib_quantum.html
/usr/share/doc/selinux-policy/html/contrib_quota.html
/usr/share/doc/selinux-policy/html/contrib_rabbitmq.html
/usr/share/doc/selinux-policy/html/contrib_radius.html
/usr/share/doc/selinux-policy/html/contrib_radvd.html
/usr/share/doc/selinux-policy/html/contrib_raid.html
/usr/share/doc/selinux-policy/html/contrib_rasdaemon.html
/usr/share/doc/selinux-policy/html/contrib_razor.html
/usr/share/doc/selinux-policy/html/contrib_rdisc.html
/usr/share/doc/selinux-policy/html/contrib_readahead.html
/usr/share/doc/selinux-policy/html/contrib_realmd.html
/usr/share/doc/selinux-policy/html/contrib_redis.html
/usr/share/doc/selinux-policy/html/contrib_remotelogin.html
/usr/share/doc/selinux-policy/html/contrib_resmgr.html
/usr/share/doc/selinux-policy/html/contrib_rgmanager.html
/usr/share/doc/selinux-policy/html/contrib_rhcs.html
/usr/share/doc/selinux-policy/html/contrib_rhev.html
/usr/share/doc/selinux-policy/html/contrib_rhgb.html
/usr/share/doc/selinux-policy/html/contrib_rhnsd.html
/usr/share/doc/selinux-policy/html/contrib_rhsmcertd.html
/usr/share/doc/selinux-policy/html/contrib_ricci.html
/usr/share/doc/selinux-policy/html/contrib_rkhunter.html
/usr/share/doc/selinux-policy/html/contrib_rkt.html
/usr/share/doc/selinux-policy/html/contrib_rlogin.html
/usr/share/doc/selinux-policy/html/contrib_rngd.html
/usr/share/doc/selinux-policy/html/contrib_rolekit.html
/usr/share/doc/selinux-policy/html/contrib_roundup.html
/usr/share/doc/selinux-policy/html/contrib_rpc.html
/usr/share/doc/selinux-policy/html/contrib_rpcbind.html
/usr/share/doc/selinux-policy/html/contrib_rpm.html
/usr/share/doc/selinux-policy/html/contrib_rrdcached.html
/usr/share/doc/selinux-policy/html/contrib_rshd.html
/usr/share/doc/selinux-policy/html/contrib_rssh.html
/usr/share/doc/selinux-policy/html/contrib_rsync.html
/usr/share/doc/selinux-policy/html/contrib_rtas.html
/usr/share/doc/selinux-policy/html/contrib_rtkit.html
/usr/share/doc/selinux-policy/html/contrib_rwho.html
/usr/share/doc/selinux-policy/html/contrib_samba.html
/usr/share/doc/selinux-policy/html/contrib_sambagui.html
/usr/share/doc/selinux-policy/html/contrib_samhain.html
/usr/share/doc/selinux-policy/html/contrib_sandbox.html
/usr/share/doc/selinux-policy/html/contrib_sandboxX.html
/usr/share/doc/selinux-policy/html/contrib_sanlock.html
/usr/share/doc/selinux-policy/html/contrib_sasl.html
/usr/share/doc/selinux-policy/html/contrib_sbd.html
/usr/share/doc/selinux-policy/html/contrib_sblim.html
/usr/share/doc/selinux-policy/html/contrib_screen.html
/usr/share/doc/selinux-policy/html/contrib_sectoolm.html
/usr/share/doc/selinux-policy/html/contrib_sendmail.html
/usr/share/doc/selinux-policy/html/contrib_sensord.html
/usr/share/doc/selinux-policy/html/contrib_setroubleshoot.html
/usr/share/doc/selinux-policy/html/contrib_sge.html
/usr/share/doc/selinux-policy/html/contrib_shorewall.html
/usr/share/doc/selinux-policy/html/contrib_shutdown.html
/usr/share/doc/selinux-policy/html/contrib_slocate.html
/usr/share/doc/selinux-policy/html/contrib_slpd.html
/usr/share/doc/selinux-policy/html/contrib_slrnpull.html
/usr/share/doc/selinux-policy/html/contrib_smartmon.html
/usr/share/doc/selinux-policy/html/contrib_smokeping.html
/usr/share/doc/selinux-policy/html/contrib_smoltclient.html
/usr/share/doc/selinux-policy/html/contrib_smsd.html
/usr/share/doc/selinux-policy/html/contrib_smstools.html
/usr/share/doc/selinux-policy/html/contrib_snapper.html
/usr/share/doc/selinux-policy/html/contrib_snmp.html
/usr/share/doc/selinux-policy/html/contrib_snort.html
/usr/share/doc/selinux-policy/html/contrib_sosreport.html
/usr/share/doc/selinux-policy/html/contrib_soundserver.html
/usr/share/doc/selinux-policy/html/contrib_spamassassin.html
/usr/share/doc/selinux-policy/html/contrib_speech-dispatcher.html
/usr/share/doc/selinux-policy/html/contrib_speedtouch.html
/usr/share/doc/selinux-policy/html/contrib_squid.html
/usr/share/doc/selinux-policy/html/contrib_sslh.html
/usr/share/doc/selinux-policy/html/contrib_sssd.html
/usr/share/doc/selinux-policy/html/contrib_stapserver.html
/usr/share/doc/selinux-policy/html/contrib_stratisd.html
/usr/share/doc/selinux-policy/html/contrib_stunnel.html
/usr/share/doc/selinux-policy/html/contrib_svnserve.html
/usr/share/doc/selinux-policy/html/contrib_swift.html
/usr/share/doc/selinux-policy/html/contrib_swift_alias.html
/usr/share/doc/selinux-policy/html/contrib_sxid.html
/usr/share/doc/selinux-policy/html/contrib_sysstat.html
/usr/share/doc/selinux-policy/html/contrib_tangd.html
/usr/share/doc/selinux-policy/html/contrib_targetd.html
/usr/share/doc/selinux-policy/html/contrib_tcpd.html
/usr/share/doc/selinux-policy/html/contrib_tcsd.html
/usr/share/doc/selinux-policy/html/contrib_telepathy.html
/usr/share/doc/selinux-policy/html/contrib_telnet.html
/usr/share/doc/selinux-policy/html/contrib_tftp.html
/usr/share/doc/selinux-policy/html/contrib_tgtd.html
/usr/share/doc/selinux-policy/html/contrib_thin.html
/usr/share/doc/selinux-policy/html/contrib_thumb.html
/usr/share/doc/selinux-policy/html/contrib_thunderbird.html
/usr/share/doc/selinux-policy/html/contrib_timedatex.html
/usr/share/doc/selinux-policy/html/contrib_timidity.html
/usr/share/doc/selinux-policy/html/contrib_tlp.html
/usr/share/doc/selinux-policy/html/contrib_tmpreaper.html
/usr/share/doc/selinux-policy/html/contrib_tomcat.html
/usr/share/doc/selinux-policy/html/contrib_tor.html
/usr/share/doc/selinux-policy/html/contrib_transproxy.html
/usr/share/doc/selinux-policy/html/contrib_tripwire.html
/usr/share/doc/selinux-policy/html/contrib_tuned.html
/usr/share/doc/selinux-policy/html/contrib_tvtime.html
/usr/share/doc/selinux-policy/html/contrib_tzdata.html
/usr/share/doc/selinux-policy/html/contrib_ucspitcp.html
/usr/share/doc/selinux-policy/html/contrib_udisks2.html
/usr/share/doc/selinux-policy/html/contrib_ulogd.html
/usr/share/doc/selinux-policy/html/contrib_uml.html
/usr/share/doc/selinux-policy/html/contrib_updfstab.html
/usr/share/doc/selinux-policy/html/contrib_uptime.html
/usr/share/doc/selinux-policy/html/contrib_usbmodules.html
/usr/share/doc/selinux-policy/html/contrib_usbmuxd.html
/usr/share/doc/selinux-policy/html/contrib_userhelper.html
/usr/share/doc/selinux-policy/html/contrib_usernetctl.html
/usr/share/doc/selinux-policy/html/contrib_uucp.html
/usr/share/doc/selinux-policy/html/contrib_uuidd.html
/usr/share/doc/selinux-policy/html/contrib_uwimap.html
/usr/share/doc/selinux-policy/html/contrib_varnishd.html
/usr/share/doc/selinux-policy/html/contrib_vbetool.html
/usr/share/doc/selinux-policy/html/contrib_vdagent.html
/usr/share/doc/selinux-policy/html/contrib_vhostmd.html
/usr/share/doc/selinux-policy/html/contrib_virt.html
/usr/share/doc/selinux-policy/html/contrib_vlock.html
/usr/share/doc/selinux-policy/html/contrib_vmtools.html
/usr/share/doc/selinux-policy/html/contrib_vmware.html
/usr/share/doc/selinux-policy/html/contrib_vnstatd.html
/usr/share/doc/selinux-policy/html/contrib_vpn.html
/usr/share/doc/selinux-policy/html/contrib_w3c.html
/usr/share/doc/selinux-policy/html/contrib_watchdog.html
/usr/share/doc/selinux-policy/html/contrib_wdmd.html
/usr/share/doc/selinux-policy/html/contrib_webadm.html
/usr/share/doc/selinux-policy/html/contrib_webalizer.html
/usr/share/doc/selinux-policy/html/contrib_wine.html
/usr/share/doc/selinux-policy/html/contrib_wireshark.html
/usr/share/doc/selinux-policy/html/contrib_wm.html
/usr/share/doc/selinux-policy/html/contrib_xen.html
/usr/share/doc/selinux-policy/html/contrib_xfs.html
/usr/share/doc/selinux-policy/html/contrib_xguest.html
/usr/share/doc/selinux-policy/html/contrib_xprint.html
/usr/share/doc/selinux-policy/html/contrib_xscreensaver.html
/usr/share/doc/selinux-policy/html/contrib_yam.html
/usr/share/doc/selinux-policy/html/contrib_zabbix.html
/usr/share/doc/selinux-policy/html/contrib_zarafa.html
/usr/share/doc/selinux-policy/html/contrib_zebra.html
/usr/share/doc/selinux-policy/html/contrib_zoneminder.html
/usr/share/doc/selinux-policy/html/contrib_zosremote.html
/usr/share/doc/selinux-policy/html/global_booleans.html
/usr/share/doc/selinux-policy/html/global_tunables.html
/usr/share/doc/selinux-policy/html/index.html
/usr/share/doc/selinux-policy/html/interfaces.html
/usr/share/doc/selinux-policy/html/kernel.html
/usr/share/doc/selinux-policy/html/kernel_corecommands.html
/usr/share/doc/selinux-policy/html/kernel_corenetwork.html
/usr/share/doc/selinux-policy/html/kernel_devices.html
/usr/share/doc/selinux-policy/html/kernel_domain.html
/usr/share/doc/selinux-policy/html/kernel_files.html
/usr/share/doc/selinux-policy/html/kernel_filesystem.html
/usr/share/doc/selinux-policy/html/kernel_kernel.html
/usr/share/doc/selinux-policy/html/kernel_mcs.html
/usr/share/doc/selinux-policy/html/kernel_mls.html
/usr/share/doc/selinux-policy/html/kernel_selinux.html
/usr/share/doc/selinux-policy/html/kernel_storage.html
/usr/share/doc/selinux-policy/html/kernel_terminal.html
/usr/share/doc/selinux-policy/html/kernel_ubac.html
/usr/share/doc/selinux-policy/html/kernel_unlabelednet.html
/usr/share/doc/selinux-policy/html/roles.html
/usr/share/doc/selinux-policy/html/roles_auditadm.html
/usr/share/doc/selinux-policy/html/roles_logadm.html
/usr/share/doc/selinux-policy/html/roles_secadm.html
/usr/share/doc/selinux-policy/html/roles_staff.html
/usr/share/doc/selinux-policy/html/roles_sysadm.html
/usr/share/doc/selinux-policy/html/roles_sysadm_secadm.html
/usr/share/doc/selinux-policy/html/roles_unconfineduser.html
/usr/share/doc/selinux-policy/html/roles_unprivuser.html
/usr/share/doc/selinux-policy/html/services.html
/usr/share/doc/selinux-policy/html/services_postgresql.html
/usr/share/doc/selinux-policy/html/services_ssh.html
/usr/share/doc/selinux-policy/html/services_xserver.html
/usr/share/doc/selinux-policy/html/style.css
/usr/share/doc/selinux-policy/html/system.html
/usr/share/doc/selinux-policy/html/system_application.html
/usr/share/doc/selinux-policy/html/system_authlogin.html
/usr/share/doc/selinux-policy/html/system_clock.html
/usr/share/doc/selinux-policy/html/system_fstools.html
/usr/share/doc/selinux-policy/html/system_getty.html
/usr/share/doc/selinux-policy/html/system_hostname.html
/usr/share/doc/selinux-policy/html/system_hotplug.html
/usr/share/doc/selinux-policy/html/system_init.html
/usr/share/doc/selinux-policy/html/system_ipsec.html
/usr/share/doc/selinux-policy/html/system_iptables.html
/usr/share/doc/selinux-policy/html/system_libraries.html
/usr/share/doc/selinux-policy/html/system_locallogin.html
/usr/share/doc/selinux-policy/html/system_logging.html
/usr/share/doc/selinux-policy/html/system_lvm.html
/usr/share/doc/selinux-policy/html/system_miscfiles.html
/usr/share/doc/selinux-policy/html/system_modutils.html
/usr/share/doc/selinux-policy/html/system_mount.html
/usr/share/doc/selinux-policy/html/system_netlabel.html
/usr/share/doc/selinux-policy/html/system_selinuxutil.html
/usr/share/doc/selinux-policy/html/system_setrans.html
/usr/share/doc/selinux-policy/html/system_sysnetwork.html
/usr/share/doc/selinux-policy/html/system_systemd.html
/usr/share/doc/selinux-policy/html/system_udev.html
/usr/share/doc/selinux-policy/html/system_unconfined.html
/usr/share/doc/selinux-policy/html/system_userdomain.html
/usr/share/doc/selinux-policy/html/templates.html
/usr/share/doc/selinux-policy/html/tunables.html
/usr/share/man/man8/NetworkManager_selinux.8.gz
/usr/share/man/man8/NetworkManager_ssh_selinux.8.gz
/usr/share/man/man8/_selinux.8.gz
/usr/share/man/man8/abrt_dump_oops_selinux.8.gz
/usr/share/man/man8/abrt_handle_event_selinux.8.gz
/usr/share/man/man8/abrt_helper_selinux.8.gz
/usr/share/man/man8/abrt_retrace_coredump_selinux.8.gz
/usr/share/man/man8/abrt_retrace_worker_selinux.8.gz
/usr/share/man/man8/abrt_selinux.8.gz
/usr/share/man/man8/abrt_upload_watch_selinux.8.gz
/usr/share/man/man8/abrt_watch_log_selinux.8.gz
/usr/share/man/man8/accountsd_selinux.8.gz
/usr/share/man/man8/acct_selinux.8.gz
/usr/share/man/man8/admin_crontab_selinux.8.gz
/usr/share/man/man8/afs_bosserver_selinux.8.gz
/usr/share/man/man8/afs_fsserver_selinux.8.gz
/usr/share/man/man8/afs_kaserver_selinux.8.gz
/usr/share/man/man8/afs_ptserver_selinux.8.gz
/usr/share/man/man8/afs_selinux.8.gz
/usr/share/man/man8/afs_vlserver_selinux.8.gz
/usr/share/man/man8/aiccu_selinux.8.gz
/usr/share/man/man8/aide_selinux.8.gz
/usr/share/man/man8/aisexec_selinux.8.gz
/usr/share/man/man8/ajaxterm_selinux.8.gz
/usr/share/man/man8/ajaxterm_ssh_selinux.8.gz
/usr/share/man/man8/alsa_selinux.8.gz
/usr/share/man/man8/amanda_recover_selinux.8.gz
/usr/share/man/man8/amanda_selinux.8.gz
/usr/share/man/man8/amavis_selinux.8.gz
/usr/share/man/man8/amtu_selinux.8.gz
/usr/share/man/man8/anaconda_selinux.8.gz
/usr/share/man/man8/anon_sftpd_selinux.8.gz
/usr/share/man/man8/antivirus_selinux.8.gz
/usr/share/man/man8/apache_selinux.8.gz
/usr/share/man/man8/apcupsd_cgi_script_selinux.8.gz
/usr/share/man/man8/apcupsd_selinux.8.gz
/usr/share/man/man8/apm_selinux.8.gz
/usr/share/man/man8/apmd_selinux.8.gz
/usr/share/man/man8/arpwatch_selinux.8.gz
/usr/share/man/man8/asterisk_selinux.8.gz
/usr/share/man/man8/audisp_remote_selinux.8.gz
/usr/share/man/man8/audisp_selinux.8.gz
/usr/share/man/man8/auditadm_screen_selinux.8.gz
/usr/share/man/man8/auditadm_selinux.8.gz
/usr/share/man/man8/auditadm_su_selinux.8.gz
/usr/share/man/man8/auditadm_sudo_selinux.8.gz
/usr/share/man/man8/auditctl_selinux.8.gz
/usr/share/man/man8/auditd_selinux.8.gz
/usr/share/man/man8/authconfig_selinux.8.gz
/usr/share/man/man8/automount_selinux.8.gz
/usr/share/man/man8/avahi_selinux.8.gz
/usr/share/man/man8/awstats_script_selinux.8.gz
/usr/share/man/man8/awstats_selinux.8.gz
/usr/share/man/man8/bacula_admin_selinux.8.gz
/usr/share/man/man8/bacula_selinux.8.gz
/usr/share/man/man8/bacula_unconfined_script_selinux.8.gz
/usr/share/man/man8/bcfg2_selinux.8.gz
/usr/share/man/man8/bind_selinux.8.gz
/usr/share/man/man8/bitlbee_selinux.8.gz
/usr/share/man/man8/blkmapd_selinux.8.gz
/usr/share/man/man8/blktap_selinux.8.gz
/usr/share/man/man8/blueman_selinux.8.gz
/usr/share/man/man8/bluetooth_helper_selinux.8.gz
/usr/share/man/man8/bluetooth_selinux.8.gz
/usr/share/man/man8/boinc_project_selinux.8.gz
/usr/share/man/man8/boinc_selinux.8.gz
/usr/share/man/man8/boltd_selinux.8.gz
/usr/share/man/man8/bootloader_selinux.8.gz
/usr/share/man/man8/brctl_selinux.8.gz
/usr/share/man/man8/brltty_selinux.8.gz
/usr/share/man/man8/bugzilla_script_selinux.8.gz
/usr/share/man/man8/bumblebee_selinux.8.gz
/usr/share/man/man8/cachefiles_kernel_selinux.8.gz
/usr/share/man/man8/cachefilesd_selinux.8.gz
/usr/share/man/man8/calamaris_selinux.8.gz
/usr/share/man/man8/callweaver_selinux.8.gz
/usr/share/man/man8/canna_selinux.8.gz
/usr/share/man/man8/cardmgr_selinux.8.gz
/usr/share/man/man8/ccs_selinux.8.gz
/usr/share/man/man8/cdcc_selinux.8.gz
/usr/share/man/man8/cdrecord_selinux.8.gz
/usr/share/man/man8/certmaster_selinux.8.gz
/usr/share/man/man8/certmonger_selinux.8.gz
/usr/share/man/man8/certmonger_unconfined_selinux.8.gz
/usr/share/man/man8/certwatch_selinux.8.gz
/usr/share/man/man8/cfengine_execd_selinux.8.gz
/usr/share/man/man8/cfengine_monitord_selinux.8.gz
/usr/share/man/man8/cfengine_serverd_selinux.8.gz
/usr/share/man/man8/cgclear_selinux.8.gz
/usr/share/man/man8/cgconfig_selinux.8.gz
/usr/share/man/man8/cgred_selinux.8.gz
/usr/share/man/man8/checkpc_selinux.8.gz
/usr/share/man/man8/checkpolicy_selinux.8.gz
/usr/share/man/man8/chfn_selinux.8.gz
/usr/share/man/man8/chkpwd_selinux.8.gz
/usr/share/man/man8/chrome_sandbox_nacl_selinux.8.gz
/usr/share/man/man8/chrome_sandbox_selinux.8.gz
/usr/share/man/man8/chronyc_selinux.8.gz
/usr/share/man/man8/chronyd_selinux.8.gz
/usr/share/man/man8/chroot_user_selinux.8.gz
/usr/share/man/man8/cinder_api_selinux.8.gz
/usr/share/man/man8/cinder_backup_selinux.8.gz
/usr/share/man/man8/cinder_scheduler_selinux.8.gz
/usr/share/man/man8/cinder_volume_selinux.8.gz
/usr/share/man/man8/ciped_selinux.8.gz
/usr/share/man/man8/clamd_selinux.8.gz
/usr/share/man/man8/clamscan_selinux.8.gz
/usr/share/man/man8/clogd_selinux.8.gz
/usr/share/man/man8/cloud_init_selinux.8.gz
/usr/share/man/man8/cluster_selinux.8.gz
/usr/share/man/man8/clvmd_selinux.8.gz
/usr/share/man/man8/cmirrord_selinux.8.gz
/usr/share/man/man8/cobblerd_selinux.8.gz
/usr/share/man/man8/cockpit_session_selinux.8.gz
/usr/share/man/man8/cockpit_ws_selinux.8.gz
/usr/share/man/man8/collectd_script_selinux.8.gz
/usr/share/man/man8/collectd_selinux.8.gz
/usr/share/man/man8/colord_selinux.8.gz
/usr/share/man/man8/comsat_selinux.8.gz
/usr/share/man/man8/condor_collector_selinux.8.gz
/usr/share/man/man8/condor_master_selinux.8.gz
/usr/share/man/man8/condor_negotiator_selinux.8.gz
/usr/share/man/man8/condor_procd_selinux.8.gz
/usr/share/man/man8/condor_schedd_selinux.8.gz
/usr/share/man/man8/condor_startd_selinux.8.gz
/usr/share/man/man8/condor_startd_ssh_selinux.8.gz
/usr/share/man/man8/conman_selinux.8.gz
/usr/share/man/man8/conman_unconfined_script_selinux.8.gz
/usr/share/man/man8/conntrackd_selinux.8.gz
/usr/share/man/man8/consolekit_selinux.8.gz
/usr/share/man/man8/container_selinux.8.gz
/usr/share/man/man8/corosync_selinux.8.gz
/usr/share/man/man8/couchdb_selinux.8.gz
/usr/share/man/man8/courier_authdaemon_selinux.8.gz
/usr/share/man/man8/courier_pcp_selinux.8.gz
/usr/share/man/man8/courier_pop_selinux.8.gz
/usr/share/man/man8/courier_sqwebmail_selinux.8.gz
/usr/share/man/man8/courier_tcpd_selinux.8.gz
/usr/share/man/man8/cpucontrol_selinux.8.gz
/usr/share/man/man8/cpufreqselector_selinux.8.gz
/usr/share/man/man8/cpuplug_selinux.8.gz
/usr/share/man/man8/cpuspeed_selinux.8.gz
/usr/share/man/man8/crack_selinux.8.gz
/usr/share/man/man8/crond_selinux.8.gz
/usr/share/man/man8/cronjob_selinux.8.gz
/usr/share/man/man8/crontab_selinux.8.gz
/usr/share/man/man8/ctdbd_selinux.8.gz
/usr/share/man/man8/cups_pdf_selinux.8.gz
/usr/share/man/man8/cupsd_config_selinux.8.gz
/usr/share/man/man8/cupsd_lpd_selinux.8.gz
/usr/share/man/man8/cupsd_selinux.8.gz
/usr/share/man/man8/cvs_script_selinux.8.gz
/usr/share/man/man8/cvs_selinux.8.gz
/usr/share/man/man8/cyphesis_selinux.8.gz
/usr/share/man/man8/cyrus_selinux.8.gz
/usr/share/man/man8/dbadm_selinux.8.gz
/usr/share/man/man8/dbadm_sudo_selinux.8.gz
/usr/share/man/man8/dbskkd_selinux.8.gz
/usr/share/man/man8/dcc_client_selinux.8.gz
/usr/share/man/man8/dcc_dbclean_selinux.8.gz
/usr/share/man/man8/dccd_selinux.8.gz
/usr/share/man/man8/dccifd_selinux.8.gz
/usr/share/man/man8/dccm_selinux.8.gz
/usr/share/man/man8/dcerpcd_selinux.8.gz
/usr/share/man/man8/ddclient_selinux.8.gz
/usr/share/man/man8/deltacloudd_selinux.8.gz
/usr/share/man/man8/denyhosts_selinux.8.gz
/usr/share/man/man8/devicekit_disk_selinux.8.gz
/usr/share/man/man8/devicekit_power_selinux.8.gz
/usr/share/man/man8/devicekit_selinux.8.gz
/usr/share/man/man8/dhcpc_selinux.8.gz
/usr/share/man/man8/dhcpd_selinux.8.gz
/usr/share/man/man8/dictd_selinux.8.gz
/usr/share/man/man8/dirsrv_selinux.8.gz
/usr/share/man/man8/dirsrv_snmp_selinux.8.gz
/usr/share/man/man8/dirsrvadmin_script_selinux.8.gz
/usr/share/man/man8/dirsrvadmin_selinux.8.gz
/usr/share/man/man8/dirsrvadmin_unconfined_script_selinux.8.gz
/usr/share/man/man8/disk_munin_plugin_selinux.8.gz
/usr/share/man/man8/dkim_milter_selinux.8.gz
/usr/share/man/man8/dlm_controld_selinux.8.gz
/usr/share/man/man8/dmesg_selinux.8.gz
/usr/share/man/man8/dmidecode_selinux.8.gz
/usr/share/man/man8/dnsmasq_selinux.8.gz
/usr/share/man/man8/dnssec_trigger_selinux.8.gz
/usr/share/man/man8/dovecot_auth_selinux.8.gz
/usr/share/man/man8/dovecot_deliver_selinux.8.gz
/usr/share/man/man8/dovecot_selinux.8.gz
/usr/share/man/man8/drbd_selinux.8.gz
/usr/share/man/man8/dspam_script_selinux.8.gz
/usr/share/man/man8/dspam_selinux.8.gz
/usr/share/man/man8/entropyd_selinux.8.gz
/usr/share/man/man8/eventlogd_selinux.8.gz
/usr/share/man/man8/evtchnd_selinux.8.gz
/usr/share/man/man8/exim_selinux.8.gz
/usr/share/man/man8/fail2ban_client_selinux.8.gz
/usr/share/man/man8/fail2ban_selinux.8.gz
/usr/share/man/man8/fcoemon_selinux.8.gz
/usr/share/man/man8/fenced_selinux.8.gz
/usr/share/man/man8/fetchmail_selinux.8.gz
/usr/share/man/man8/fingerd_selinux.8.gz
/usr/share/man/man8/firewalld_selinux.8.gz
/usr/share/man/man8/firewallgui_selinux.8.gz
/usr/share/man/man8/firstboot_selinux.8.gz
/usr/share/man/man8/foghorn_selinux.8.gz
/usr/share/man/man8/fprintd_selinux.8.gz
/usr/share/man/man8/freeipmi_bmc_watchdog_selinux.8.gz
/usr/share/man/man8/freeipmi_ipmidetectd_selinux.8.gz
/usr/share/man/man8/freeipmi_ipmiseld_selinux.8.gz
/usr/share/man/man8/freqset_selinux.8.gz
/usr/share/man/man8/freshclam_selinux.8.gz
/usr/share/man/man8/fsadm_selinux.8.gz
/usr/share/man/man8/fsdaemon_selinux.8.gz
/usr/share/man/man8/ftpd_selinux.8.gz
/usr/share/man/man8/ftpdctl_selinux.8.gz
/usr/share/man/man8/fwupd_selinux.8.gz
/usr/share/man/man8/games_selinux.8.gz
/usr/share/man/man8/games_srv_selinux.8.gz
/usr/share/man/man8/gconfd_selinux.8.gz
/usr/share/man/man8/gconfdefaultsm_selinux.8.gz
/usr/share/man/man8/gdomap_selinux.8.gz
/usr/share/man/man8/geoclue_selinux.8.gz
/usr/share/man/man8/getty_selinux.8.gz
/usr/share/man/man8/gfs_controld_selinux.8.gz
/usr/share/man/man8/git_script_selinux.8.gz
/usr/share/man/man8/git_session_selinux.8.gz
/usr/share/man/man8/git_system_selinux.8.gz
/usr/share/man/man8/gitosis_selinux.8.gz
/usr/share/man/man8/glance_api_selinux.8.gz
/usr/share/man/man8/glance_registry_selinux.8.gz
/usr/share/man/man8/glance_scrubber_selinux.8.gz
/usr/share/man/man8/glusterd_selinux.8.gz
/usr/share/man/man8/gnomesystemmm_selinux.8.gz
/usr/share/man/man8/gpg_agent_selinux.8.gz
/usr/share/man/man8/gpg_helper_selinux.8.gz
/usr/share/man/man8/gpg_pinentry_selinux.8.gz
/usr/share/man/man8/gpg_selinux.8.gz
/usr/share/man/man8/gpg_web_selinux.8.gz
/usr/share/man/man8/gpm_selinux.8.gz
/usr/share/man/man8/gpsd_selinux.8.gz
/usr/share/man/man8/greylist_milter_selinux.8.gz
/usr/share/man/man8/groupadd_selinux.8.gz
/usr/share/man/man8/groupd_selinux.8.gz
/usr/share/man/man8/gssd_selinux.8.gz
/usr/share/man/man8/gssproxy_selinux.8.gz
/usr/share/man/man8/guest_selinux.8.gz
/usr/share/man/man8/haproxy_selinux.8.gz
/usr/share/man/man8/hddtemp_selinux.8.gz
/usr/share/man/man8/hostapd_selinux.8.gz
/usr/share/man/man8/hostname_selinux.8.gz
/usr/share/man/man8/hsqldb_selinux.8.gz
/usr/share/man/man8/httpd_helper_selinux.8.gz
/usr/share/man/man8/httpd_passwd_selinux.8.gz
/usr/share/man/man8/httpd_php_selinux.8.gz
/usr/share/man/man8/httpd_rotatelogs_selinux.8.gz
/usr/share/man/man8/httpd_selinux.8.gz
/usr/share/man/man8/httpd_suexec_selinux.8.gz
/usr/share/man/man8/httpd_sys_script_selinux.8.gz
/usr/share/man/man8/httpd_unconfined_script_selinux.8.gz
/usr/share/man/man8/httpd_user_script_selinux.8.gz
/usr/share/man/man8/hwclock_selinux.8.gz
/usr/share/man/man8/hwloc_dhwd_selinux.8.gz
/usr/share/man/man8/hypervkvp_selinux.8.gz
/usr/share/man/man8/hypervvssd_selinux.8.gz
/usr/share/man/man8/ibacm_selinux.8.gz
/usr/share/man/man8/iceauth_selinux.8.gz
/usr/share/man/man8/icecast_selinux.8.gz
/usr/share/man/man8/ifconfig_selinux.8.gz
/usr/share/man/man8/inetd_child_selinux.8.gz
/usr/share/man/man8/inetd_selinux.8.gz
/usr/share/man/man8/init_selinux.8.gz
/usr/share/man/man8/initrc_selinux.8.gz
/usr/share/man/man8/innd_selinux.8.gz
/usr/share/man/man8/install_selinux.8.gz
/usr/share/man/man8/iodined_selinux.8.gz
/usr/share/man/man8/iotop_selinux.8.gz
/usr/share/man/man8/ipa_custodia_selinux.8.gz
/usr/share/man/man8/ipa_dnskey_selinux.8.gz
/usr/share/man/man8/ipa_helper_selinux.8.gz
/usr/share/man/man8/ipa_ods_exporter_selinux.8.gz
/usr/share/man/man8/ipa_otpd_selinux.8.gz
/usr/share/man/man8/ipmievd_helper_selinux.8.gz
/usr/share/man/man8/ipmievd_selinux.8.gz
/usr/share/man/man8/ipsec_mgmt_selinux.8.gz
/usr/share/man/man8/ipsec_selinux.8.gz
/usr/share/man/man8/iptables_selinux.8.gz
/usr/share/man/man8/irc_selinux.8.gz
/usr/share/man/man8/irqbalance_selinux.8.gz
/usr/share/man/man8/irssi_selinux.8.gz
/usr/share/man/man8/iscsid_selinux.8.gz
/usr/share/man/man8/isnsd_selinux.8.gz
/usr/share/man/man8/iwhd_selinux.8.gz
/usr/share/man/man8/jabberd_router_selinux.8.gz
/usr/share/man/man8/jabberd_selinux.8.gz
/usr/share/man/man8/jetty_selinux.8.gz
/usr/share/man/man8/jockey_selinux.8.gz
/usr/share/man/man8/journalctl_selinux.8.gz
/usr/share/man/man8/kadmind_selinux.8.gz
/usr/share/man/man8/kdump_selinux.8.gz
/usr/share/man/man8/kdumpctl_selinux.8.gz
/usr/share/man/man8/kdumpgui_selinux.8.gz
/usr/share/man/man8/keepalived_selinux.8.gz
/usr/share/man/man8/keepalived_unconfined_script_selinux.8.gz
/usr/share/man/man8/kernel_selinux.8.gz
/usr/share/man/man8/keyboardd_selinux.8.gz
/usr/share/man/man8/keystone_cgi_script_selinux.8.gz
/usr/share/man/man8/keystone_selinux.8.gz
/usr/share/man/man8/kismet_selinux.8.gz
/usr/share/man/man8/klogd_selinux.8.gz
/usr/share/man/man8/kmod_selinux.8.gz
/usr/share/man/man8/kmscon_selinux.8.gz
/usr/share/man/man8/kpatch_selinux.8.gz
/usr/share/man/man8/kpropd_selinux.8.gz
/usr/share/man/man8/krb5kdc_selinux.8.gz
/usr/share/man/man8/ksmtuned_selinux.8.gz
/usr/share/man/man8/ktalkd_selinux.8.gz
/usr/share/man/man8/l2tpd_selinux.8.gz
/usr/share/man/man8/ldconfig_selinux.8.gz
/usr/share/man/man8/libvirt_selinux.8.gz
/usr/share/man/man8/lircd_selinux.8.gz
/usr/share/man/man8/livecd_selinux.8.gz
/usr/share/man/man8/lldpad_selinux.8.gz
/usr/share/man/man8/load_policy_selinux.8.gz
/usr/share/man/man8/loadkeys_selinux.8.gz
/usr/share/man/man8/local_login_selinux.8.gz
/usr/share/man/man8/locate_selinux.8.gz
/usr/share/man/man8/lockdev_selinux.8.gz
/usr/share/man/man8/logadm_selinux.8.gz
/usr/share/man/man8/logrotate_mail_selinux.8.gz
/usr/share/man/man8/logrotate_selinux.8.gz
/usr/share/man/man8/logwatch_mail_selinux.8.gz
/usr/share/man/man8/logwatch_selinux.8.gz
/usr/share/man/man8/lpd_selinux.8.gz
/usr/share/man/man8/lpr_selinux.8.gz
/usr/share/man/man8/lsassd_selinux.8.gz
/usr/share/man/man8/lsmd_plugin_selinux.8.gz
/usr/share/man/man8/lsmd_selinux.8.gz
/usr/share/man/man8/lttng_sessiond_selinux.8.gz
/usr/share/man/man8/lvm_selinux.8.gz
/usr/share/man/man8/lwiod_selinux.8.gz
/usr/share/man/man8/lwregd_selinux.8.gz
/usr/share/man/man8/lwsmd_selinux.8.gz
/usr/share/man/man8/mail_munin_plugin_selinux.8.gz
/usr/share/man/man8/mailman_cgi_selinux.8.gz
/usr/share/man/man8/mailman_mail_selinux.8.gz
/usr/share/man/man8/mailman_queue_selinux.8.gz
/usr/share/man/man8/man2html_script_selinux.8.gz
/usr/share/man/man8/mandb_selinux.8.gz
/usr/share/man/man8/mcelog_selinux.8.gz
/usr/share/man/man8/mdadm_selinux.8.gz
/usr/share/man/man8/mediawiki_script_selinux.8.gz
/usr/share/man/man8/memcached_selinux.8.gz
/usr/share/man/man8/mencoder_selinux.8.gz
/usr/share/man/man8/minidlna_selinux.8.gz
/usr/share/man/man8/minissdpd_selinux.8.gz
/usr/share/man/man8/mip6d_selinux.8.gz
/usr/share/man/man8/mirrormanager_selinux.8.gz
/usr/share/man/man8/mock_build_selinux.8.gz
/usr/share/man/man8/mock_selinux.8.gz
/usr/share/man/man8/modemmanager_selinux.8.gz
/usr/share/man/man8/mojomojo_script_selinux.8.gz
/usr/share/man/man8/mon_procd_selinux.8.gz
/usr/share/man/man8/mon_statd_selinux.8.gz
/usr/share/man/man8/mongod_selinux.8.gz
/usr/share/man/man8/motion_selinux.8.gz
/usr/share/man/man8/mount_ecryptfs_selinux.8.gz
/usr/share/man/man8/mount_selinux.8.gz
/usr/share/man/man8/mozilla_plugin_config_selinux.8.gz
/usr/share/man/man8/mozilla_plugin_selinux.8.gz
/usr/share/man/man8/mozilla_selinux.8.gz
/usr/share/man/man8/mpd_selinux.8.gz
/usr/share/man/man8/mplayer_selinux.8.gz
/usr/share/man/man8/mrtg_selinux.8.gz
/usr/share/man/man8/mscan_selinux.8.gz
/usr/share/man/man8/munin_script_selinux.8.gz
/usr/share/man/man8/munin_selinux.8.gz
/usr/share/man/man8/mysqld_safe_selinux.8.gz
/usr/share/man/man8/mysqld_selinux.8.gz
/usr/share/man/man8/mysqlmanagerd_selinux.8.gz
/usr/share/man/man8/mythtv_script_selinux.8.gz
/usr/share/man/man8/naemon_selinux.8.gz
/usr/share/man/man8/nagios_admin_plugin_selinux.8.gz
/usr/share/man/man8/nagios_checkdisk_plugin_selinux.8.gz
/usr/share/man/man8/nagios_eventhandler_plugin_selinux.8.gz
/usr/share/man/man8/nagios_mail_plugin_selinux.8.gz
/usr/share/man/man8/nagios_openshift_plugin_selinux.8.gz
/usr/share/man/man8/nagios_script_selinux.8.gz
/usr/share/man/man8/nagios_selinux.8.gz
/usr/share/man/man8/nagios_services_plugin_selinux.8.gz
/usr/share/man/man8/nagios_system_plugin_selinux.8.gz
/usr/share/man/man8/nagios_unconfined_plugin_selinux.8.gz
/usr/share/man/man8/named_selinux.8.gz
/usr/share/man/man8/namespace_init_selinux.8.gz
/usr/share/man/man8/ncftool_selinux.8.gz
/usr/share/man/man8/ndc_selinux.8.gz
/usr/share/man/man8/netlabel_mgmt_selinux.8.gz
/usr/share/man/man8/netlogond_selinux.8.gz
/usr/share/man/man8/netutils_selinux.8.gz
/usr/share/man/man8/neutron_selinux.8.gz
/usr/share/man/man8/newrole_selinux.8.gz
/usr/share/man/man8/nfsd_selinux.8.gz
/usr/share/man/man8/ninfod_selinux.8.gz
/usr/share/man/man8/nmbd_selinux.8.gz
/usr/share/man/man8/nova_selinux.8.gz
/usr/share/man/man8/nrpe_selinux.8.gz
/usr/share/man/man8/nscd_selinux.8.gz
/usr/share/man/man8/nsd_crond_selinux.8.gz
/usr/share/man/man8/nsd_selinux.8.gz
/usr/share/man/man8/nslcd_selinux.8.gz
/usr/share/man/man8/ntop_selinux.8.gz
/usr/share/man/man8/ntpd_selinux.8.gz
/usr/share/man/man8/numad_selinux.8.gz
/usr/share/man/man8/nut_upsd_selinux.8.gz
/usr/share/man/man8/nut_upsdrvctl_selinux.8.gz
/usr/share/man/man8/nut_upsmon_selinux.8.gz
/usr/share/man/man8/nutups_cgi_script_selinux.8.gz
/usr/share/man/man8/nx_server_selinux.8.gz
/usr/share/man/man8/nx_server_ssh_selinux.8.gz
/usr/share/man/man8/obex_selinux.8.gz
/usr/share/man/man8/oddjob_mkhomedir_selinux.8.gz
/usr/share/man/man8/oddjob_selinux.8.gz
/usr/share/man/man8/opafm_selinux.8.gz
/usr/share/man/man8/openct_selinux.8.gz
/usr/share/man/man8/opendnssec_selinux.8.gz
/usr/share/man/man8/openfortivpn_selinux.8.gz
/usr/share/man/man8/openhpid_selinux.8.gz
/usr/share/man/man8/openshift_app_selinux.8.gz
/usr/share/man/man8/openshift_cgroup_read_selinux.8.gz
/usr/share/man/man8/openshift_cron_selinux.8.gz
/usr/share/man/man8/openshift_initrc_selinux.8.gz
/usr/share/man/man8/openshift_net_read_selinux.8.gz
/usr/share/man/man8/openshift_script_selinux.8.gz
/usr/share/man/man8/openshift_selinux.8.gz
/usr/share/man/man8/opensm_selinux.8.gz
/usr/share/man/man8/openvpn_selinux.8.gz
/usr/share/man/man8/openvpn_unconfined_script_selinux.8.gz
/usr/share/man/man8/openvswitch_selinux.8.gz
/usr/share/man/man8/openwsman_selinux.8.gz
/usr/share/man/man8/oracleasm_selinux.8.gz
/usr/share/man/man8/osad_selinux.8.gz
/usr/share/man/man8/pacemaker_selinux.8.gz
/usr/share/man/man8/pads_selinux.8.gz
/usr/share/man/man8/pam_console_selinux.8.gz
/usr/share/man/man8/pam_timestamp_selinux.8.gz
/usr/share/man/man8/passenger_selinux.8.gz
/usr/share/man/man8/passwd_selinux.8.gz
/usr/share/man/man8/pcp_plugin_selinux.8.gz
/usr/share/man/man8/pcp_pmcd_selinux.8.gz
/usr/share/man/man8/pcp_pmie_selinux.8.gz
/usr/share/man/man8/pcp_pmlogger_selinux.8.gz
/usr/share/man/man8/pcp_pmmgr_selinux.8.gz
/usr/share/man/man8/pcp_pmproxy_selinux.8.gz
/usr/share/man/man8/pcp_pmwebd_selinux.8.gz
/usr/share/man/man8/pcscd_selinux.8.gz
/usr/share/man/man8/pdns_control_selinux.8.gz
/usr/share/man/man8/pdns_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_account_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_admin_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_logicalfile_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_services_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_storage_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_system_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_unconfined_selinux.8.gz
/usr/share/man/man8/pegasus_selinux.8.gz
/usr/share/man/man8/pesign_selinux.8.gz
/usr/share/man/man8/phc2sys_selinux.8.gz
/usr/share/man/man8/ping_selinux.8.gz
/usr/share/man/man8/pingd_selinux.8.gz
/usr/share/man/man8/piranha_fos_selinux.8.gz
/usr/share/man/man8/piranha_lvs_selinux.8.gz
/usr/share/man/man8/piranha_pulse_selinux.8.gz
/usr/share/man/man8/piranha_web_selinux.8.gz
/usr/share/man/man8/pkcs11proxyd_selinux.8.gz
/usr/share/man/man8/pkcs_slotd_selinux.8.gz
/usr/share/man/man8/pki_ra_selinux.8.gz
/usr/share/man/man8/pki_tomcat_script_selinux.8.gz
/usr/share/man/man8/pki_tomcat_selinux.8.gz
/usr/share/man/man8/pki_tps_selinux.8.gz
/usr/share/man/man8/plymouth_selinux.8.gz
/usr/share/man/man8/plymouthd_selinux.8.gz
/usr/share/man/man8/podsleuth_selinux.8.gz
/usr/share/man/man8/policykit_auth_selinux.8.gz
/usr/share/man/man8/policykit_grant_selinux.8.gz
/usr/share/man/man8/policykit_resolve_selinux.8.gz
/usr/share/man/man8/policykit_selinux.8.gz
/usr/share/man/man8/polipo_selinux.8.gz
/usr/share/man/man8/polipo_session_selinux.8.gz
/usr/share/man/man8/portmap_helper_selinux.8.gz
/usr/share/man/man8/portmap_selinux.8.gz
/usr/share/man/man8/portreserve_selinux.8.gz
/usr/share/man/man8/postfix_bounce_selinux.8.gz
/usr/share/man/man8/postfix_cleanup_selinux.8.gz
/usr/share/man/man8/postfix_local_selinux.8.gz
/usr/share/man/man8/postfix_map_selinux.8.gz
/usr/share/man/man8/postfix_master_selinux.8.gz
/usr/share/man/man8/postfix_pickup_selinux.8.gz
/usr/share/man/man8/postfix_pipe_selinux.8.gz
/usr/share/man/man8/postfix_postdrop_selinux.8.gz
/usr/share/man/man8/postfix_postqueue_selinux.8.gz
/usr/share/man/man8/postfix_qmgr_selinux.8.gz
/usr/share/man/man8/postfix_showq_selinux.8.gz
/usr/share/man/man8/postfix_smtp_selinux.8.gz
/usr/share/man/man8/postfix_smtpd_selinux.8.gz
/usr/share/man/man8/postfix_virtual_selinux.8.gz
/usr/share/man/man8/postgresql_selinux.8.gz
/usr/share/man/man8/postgrey_selinux.8.gz
/usr/share/man/man8/pppd_selinux.8.gz
/usr/share/man/man8/pptp_selinux.8.gz
/usr/share/man/man8/prelink_cron_system_selinux.8.gz
/usr/share/man/man8/prelink_selinux.8.gz
/usr/share/man/man8/prelude_audisp_selinux.8.gz
/usr/share/man/man8/prelude_correlator_selinux.8.gz
/usr/share/man/man8/prelude_lml_selinux.8.gz
/usr/share/man/man8/prelude_selinux.8.gz
/usr/share/man/man8/preupgrade_selinux.8.gz
/usr/share/man/man8/prewikka_script_selinux.8.gz
/usr/share/man/man8/privoxy_selinux.8.gz
/usr/share/man/man8/procmail_selinux.8.gz
/usr/share/man/man8/prosody_selinux.8.gz
/usr/share/man/man8/psad_selinux.8.gz
/usr/share/man/man8/ptal_selinux.8.gz
/usr/share/man/man8/ptchown_selinux.8.gz
/usr/share/man/man8/ptp4l_selinux.8.gz
/usr/share/man/man8/publicfile_selinux.8.gz
/usr/share/man/man8/pulseaudio_selinux.8.gz
/usr/share/man/man8/puppetagent_selinux.8.gz
/usr/share/man/man8/puppetca_selinux.8.gz
/usr/share/man/man8/puppetmaster_selinux.8.gz
/usr/share/man/man8/pwauth_selinux.8.gz
/usr/share/man/man8/pyicqt_selinux.8.gz
/usr/share/man/man8/qdiskd_selinux.8.gz
/usr/share/man/man8/qemu_dm_selinux.8.gz
/usr/share/man/man8/qmail_clean_selinux.8.gz
/usr/share/man/man8/qmail_inject_selinux.8.gz
/usr/share/man/man8/qmail_local_selinux.8.gz
/usr/share/man/man8/qmail_lspawn_selinux.8.gz
/usr/share/man/man8/qmail_queue_selinux.8.gz
/usr/share/man/man8/qmail_remote_selinux.8.gz
/usr/share/man/man8/qmail_rspawn_selinux.8.gz
/usr/share/man/man8/qmail_send_selinux.8.gz
/usr/share/man/man8/qmail_smtpd_selinux.8.gz
/usr/share/man/man8/qmail_splogger_selinux.8.gz
/usr/share/man/man8/qmail_start_selinux.8.gz
/usr/share/man/man8/qmail_tcp_env_selinux.8.gz
/usr/share/man/man8/qpidd_selinux.8.gz
/usr/share/man/man8/quota_nld_selinux.8.gz
/usr/share/man/man8/quota_selinux.8.gz
/usr/share/man/man8/rabbitmq_selinux.8.gz
/usr/share/man/man8/racoon_selinux.8.gz
/usr/share/man/man8/radiusd_selinux.8.gz
/usr/share/man/man8/radvd_selinux.8.gz
/usr/share/man/man8/raid_selinux.8.gz
/usr/share/man/man8/rasdaemon_selinux.8.gz
/usr/share/man/man8/rdisc_selinux.8.gz
/usr/share/man/man8/readahead_selinux.8.gz
/usr/share/man/man8/realmd_consolehelper_selinux.8.gz
/usr/share/man/man8/realmd_selinux.8.gz
/usr/share/man/man8/redis_selinux.8.gz
/usr/share/man/man8/regex_milter_selinux.8.gz
/usr/share/man/man8/remote_login_selinux.8.gz
/usr/share/man/man8/restorecond_selinux.8.gz
/usr/share/man/man8/rgmanager_selinux.8.gz
/usr/share/man/man8/rhev_agentd_consolehelper_selinux.8.gz
/usr/share/man/man8/rhev_agentd_selinux.8.gz
/usr/share/man/man8/rhgb_selinux.8.gz
/usr/share/man/man8/rhnsd_selinux.8.gz
/usr/share/man/man8/rhsmcertd_selinux.8.gz
/usr/share/man/man8/ricci_modcluster_selinux.8.gz
/usr/share/man/man8/ricci_modclusterd_selinux.8.gz
/usr/share/man/man8/ricci_modlog_selinux.8.gz
/usr/share/man/man8/ricci_modrpm_selinux.8.gz
/usr/share/man/man8/ricci_modservice_selinux.8.gz
/usr/share/man/man8/ricci_modstorage_selinux.8.gz
/usr/share/man/man8/ricci_selinux.8.gz
/usr/share/man/man8/rkt_selinux.8.gz
/usr/share/man/man8/rlogind_selinux.8.gz
/usr/share/man/man8/rngd_selinux.8.gz
/usr/share/man/man8/rolekit_selinux.8.gz
/usr/share/man/man8/roundup_selinux.8.gz
/usr/share/man/man8/rpcbind_selinux.8.gz
/usr/share/man/man8/rpcd_selinux.8.gz
/usr/share/man/man8/rpm_script_selinux.8.gz
/usr/share/man/man8/rpm_selinux.8.gz
/usr/share/man/man8/rrdcached_selinux.8.gz
/usr/share/man/man8/rshd_selinux.8.gz
/usr/share/man/man8/rssh_chroot_helper_selinux.8.gz
/usr/share/man/man8/rssh_selinux.8.gz
/usr/share/man/man8/rsync_selinux.8.gz
/usr/share/man/man8/rtas_errd_selinux.8.gz
/usr/share/man/man8/rtkit_daemon_selinux.8.gz
/usr/share/man/man8/run_init_selinux.8.gz
/usr/share/man/man8/rwho_selinux.8.gz
/usr/share/man/man8/samba_net_selinux.8.gz
/usr/share/man/man8/samba_selinux.8.gz
/usr/share/man/man8/samba_unconfined_net_selinux.8.gz
/usr/share/man/man8/samba_unconfined_script_selinux.8.gz
/usr/share/man/man8/sambagui_selinux.8.gz
/usr/share/man/man8/sandbox_min_client_selinux.8.gz
/usr/share/man/man8/sandbox_min_selinux.8.gz
/usr/share/man/man8/sandbox_net_client_selinux.8.gz
/usr/share/man/man8/sandbox_net_selinux.8.gz
/usr/share/man/man8/sandbox_selinux.8.gz
/usr/share/man/man8/sandbox_web_client_selinux.8.gz
/usr/share/man/man8/sandbox_web_selinux.8.gz
/usr/share/man/man8/sandbox_x_client_selinux.8.gz
/usr/share/man/man8/sandbox_x_selinux.8.gz
/usr/share/man/man8/sandbox_xserver_selinux.8.gz
/usr/share/man/man8/sanlk_resetd_selinux.8.gz
/usr/share/man/man8/sanlock_selinux.8.gz
/usr/share/man/man8/saslauthd_selinux.8.gz
/usr/share/man/man8/sbd_selinux.8.gz
/usr/share/man/man8/sblim_gatherd_selinux.8.gz
/usr/share/man/man8/sblim_reposd_selinux.8.gz
/usr/share/man/man8/sblim_sfcbd_selinux.8.gz
/usr/share/man/man8/secadm_screen_selinux.8.gz
/usr/share/man/man8/secadm_selinux.8.gz
/usr/share/man/man8/secadm_su_selinux.8.gz
/usr/share/man/man8/secadm_sudo_selinux.8.gz
/usr/share/man/man8/sectoolm_selinux.8.gz
/usr/share/man/man8/selinux_munin_plugin_selinux.8.gz
/usr/share/man/man8/semanage_selinux.8.gz
/usr/share/man/man8/sendmail_selinux.8.gz
/usr/share/man/man8/sensord_selinux.8.gz
/usr/share/man/man8/sepgsql_ranged_proc_selinux.8.gz
/usr/share/man/man8/sepgsql_trusted_proc_selinux.8.gz
/usr/share/man/man8/services_munin_plugin_selinux.8.gz
/usr/share/man/man8/setfiles_mac_selinux.8.gz
/usr/share/man/man8/setfiles_selinux.8.gz
/usr/share/man/man8/setkey_selinux.8.gz
/usr/share/man/man8/setrans_selinux.8.gz
/usr/share/man/man8/setroubleshoot_fixit_selinux.8.gz
/usr/share/man/man8/setroubleshootd_selinux.8.gz
/usr/share/man/man8/setsebool_selinux.8.gz
/usr/share/man/man8/sftpd_selinux.8.gz
/usr/share/man/man8/sge_execd_selinux.8.gz
/usr/share/man/man8/sge_job_selinux.8.gz
/usr/share/man/man8/sge_job_ssh_selinux.8.gz
/usr/share/man/man8/sge_shepherd_selinux.8.gz
/usr/share/man/man8/shorewall_selinux.8.gz
/usr/share/man/man8/showmount_selinux.8.gz
/usr/share/man/man8/slapd_selinux.8.gz
/usr/share/man/man8/slpd_selinux.8.gz
/usr/share/man/man8/smartmon_selinux.8.gz
/usr/share/man/man8/smbcontrol_selinux.8.gz
/usr/share/man/man8/smbd_selinux.8.gz
/usr/share/man/man8/smbmount_selinux.8.gz
/usr/share/man/man8/smokeping_cgi_script_selinux.8.gz
/usr/share/man/man8/smokeping_selinux.8.gz
/usr/share/man/man8/smoltclient_selinux.8.gz
/usr/share/man/man8/smsd_selinux.8.gz
/usr/share/man/man8/snapperd_selinux.8.gz
/usr/share/man/man8/snmpd_selinux.8.gz
/usr/share/man/man8/snort_selinux.8.gz
/usr/share/man/man8/sosreport_selinux.8.gz
/usr/share/man/man8/soundd_selinux.8.gz
/usr/share/man/man8/spamass_milter_selinux.8.gz
/usr/share/man/man8/spamc_selinux.8.gz
/usr/share/man/man8/spamd_selinux.8.gz
/usr/share/man/man8/spamd_update_selinux.8.gz
/usr/share/man/man8/speech_dispatcher_selinux.8.gz
/usr/share/man/man8/squid_cron_selinux.8.gz
/usr/share/man/man8/squid_script_selinux.8.gz
/usr/share/man/man8/squid_selinux.8.gz
/usr/share/man/man8/srvsvcd_selinux.8.gz
/usr/share/man/man8/ssh_keygen_selinux.8.gz
/usr/share/man/man8/ssh_keysign_selinux.8.gz
/usr/share/man/man8/ssh_selinux.8.gz
/usr/share/man/man8/sshd_keygen_selinux.8.gz
/usr/share/man/man8/sshd_net_selinux.8.gz
/usr/share/man/man8/sshd_sandbox_selinux.8.gz
/usr/share/man/man8/sshd_selinux.8.gz
/usr/share/man/man8/sslh_selinux.8.gz
/usr/share/man/man8/sssd_selinux.8.gz
/usr/share/man/man8/sssd_selinux_manager_selinux.8.gz
/usr/share/man/man8/staff_consolehelper_selinux.8.gz
/usr/share/man/man8/staff_dbusd_selinux.8.gz
/usr/share/man/man8/staff_gkeyringd_selinux.8.gz
/usr/share/man/man8/staff_screen_selinux.8.gz
/usr/share/man/man8/staff_selinux.8.gz
/usr/share/man/man8/staff_seunshare_selinux.8.gz
/usr/share/man/man8/staff_ssh_agent_selinux.8.gz
/usr/share/man/man8/staff_sudo_selinux.8.gz
/usr/share/man/man8/staff_wine_selinux.8.gz
/usr/share/man/man8/stapserver_selinux.8.gz
/usr/share/man/man8/stratisd_selinux.8.gz
/usr/share/man/man8/stunnel_selinux.8.gz
/usr/share/man/man8/sulogin_selinux.8.gz
/usr/share/man/man8/svc_multilog_selinux.8.gz
/usr/share/man/man8/svc_run_selinux.8.gz
/usr/share/man/man8/svc_start_selinux.8.gz
/usr/share/man/man8/svirt_kvm_net_selinux.8.gz
/usr/share/man/man8/svirt_qemu_net_selinux.8.gz
/usr/share/man/man8/svirt_selinux.8.gz
/usr/share/man/man8/svirt_socket_selinux.8.gz
/usr/share/man/man8/svirt_tcg_selinux.8.gz
/usr/share/man/man8/svnserve_selinux.8.gz
/usr/share/man/man8/swat_selinux.8.gz
/usr/share/man/man8/swift_selinux.8.gz
/usr/share/man/man8/sysadm_dbusd_selinux.8.gz
/usr/share/man/man8/sysadm_gkeyringd_selinux.8.gz
/usr/share/man/man8/sysadm_passwd_selinux.8.gz
/usr/share/man/man8/sysadm_screen_selinux.8.gz
/usr/share/man/man8/sysadm_selinux.8.gz
/usr/share/man/man8/sysadm_seunshare_selinux.8.gz
/usr/share/man/man8/sysadm_ssh_agent_selinux.8.gz
/usr/share/man/man8/sysadm_su_selinux.8.gz
/usr/share/man/man8/sysadm_sudo_selinux.8.gz
/usr/share/man/man8/syslogd_selinux.8.gz
/usr/share/man/man8/sysstat_selinux.8.gz
/usr/share/man/man8/system_cronjob_selinux.8.gz
/usr/share/man/man8/system_dbusd_selinux.8.gz
/usr/share/man/man8/system_mail_selinux.8.gz
/usr/share/man/man8/system_munin_plugin_selinux.8.gz
/usr/share/man/man8/systemd_bootchart_selinux.8.gz
/usr/share/man/man8/systemd_coredump_selinux.8.gz
/usr/share/man/man8/systemd_gpt_generator_selinux.8.gz
/usr/share/man/man8/systemd_hostnamed_selinux.8.gz
/usr/share/man/man8/systemd_hwdb_selinux.8.gz
/usr/share/man/man8/systemd_importd_selinux.8.gz
/usr/share/man/man8/systemd_initctl_selinux.8.gz
/usr/share/man/man8/systemd_localed_selinux.8.gz
/usr/share/man/man8/systemd_logger_selinux.8.gz
/usr/share/man/man8/systemd_logind_selinux.8.gz
/usr/share/man/man8/systemd_machined_selinux.8.gz
/usr/share/man/man8/systemd_modules_load_selinux.8.gz
/usr/share/man/man8/systemd_networkd_selinux.8.gz
/usr/share/man/man8/systemd_notify_selinux.8.gz
/usr/share/man/man8/systemd_passwd_agent_selinux.8.gz
/usr/share/man/man8/systemd_resolved_selinux.8.gz
/usr/share/man/man8/systemd_rfkill_selinux.8.gz
/usr/share/man/man8/systemd_sysctl_selinux.8.gz
/usr/share/man/man8/systemd_timedated_selinux.8.gz
/usr/share/man/man8/systemd_tmpfiles_selinux.8.gz
/usr/share/man/man8/systemd_userdbd_selinux.8.gz
/usr/share/man/man8/tangd_selinux.8.gz
/usr/share/man/man8/targetd_selinux.8.gz
/usr/share/man/man8/tcpd_selinux.8.gz
/usr/share/man/man8/tcsd_selinux.8.gz
/usr/share/man/man8/telepathy_gabble_selinux.8.gz
/usr/share/man/man8/telepathy_idle_selinux.8.gz
/usr/share/man/man8/telepathy_logger_selinux.8.gz
/usr/share/man/man8/telepathy_mission_control_selinux.8.gz
/usr/share/man/man8/telepathy_msn_selinux.8.gz
/usr/share/man/man8/telepathy_salut_selinux.8.gz
/usr/share/man/man8/telepathy_sofiasip_selinux.8.gz
/usr/share/man/man8/telepathy_stream_engine_selinux.8.gz
/usr/share/man/man8/telepathy_sunshine_selinux.8.gz
/usr/share/man/man8/telnetd_selinux.8.gz
/usr/share/man/man8/tftpd_selinux.8.gz
/usr/share/man/man8/tgtd_selinux.8.gz
/usr/share/man/man8/thin_aeolus_configserver_selinux.8.gz
/usr/share/man/man8/thin_selinux.8.gz
/usr/share/man/man8/thumb_selinux.8.gz
/usr/share/man/man8/timedatex_selinux.8.gz
/usr/share/man/man8/timemaster_selinux.8.gz
/usr/share/man/man8/tlp_selinux.8.gz
/usr/share/man/man8/tmpreaper_selinux.8.gz
/usr/share/man/man8/tomcat_selinux.8.gz
/usr/share/man/man8/tor_selinux.8.gz
/usr/share/man/man8/traceroute_selinux.8.gz
/usr/share/man/man8/tuned_selinux.8.gz
/usr/share/man/man8/tvtime_selinux.8.gz
/usr/share/man/man8/udev_selinux.8.gz
/usr/share/man/man8/ulogd_selinux.8.gz
/usr/share/man/man8/uml_selinux.8.gz
/usr/share/man/man8/uml_switch_selinux.8.gz
/usr/share/man/man8/unconfined_cronjob_selinux.8.gz
/usr/share/man/man8/unconfined_dbusd_selinux.8.gz
/usr/share/man/man8/unconfined_mount_selinux.8.gz
/usr/share/man/man8/unconfined_munin_plugin_selinux.8.gz
/usr/share/man/man8/unconfined_selinux.8.gz
/usr/share/man/man8/unconfined_sendmail_selinux.8.gz
/usr/share/man/man8/unconfined_service_selinux.8.gz
/usr/share/man/man8/updfstab_selinux.8.gz
/usr/share/man/man8/updpwd_selinux.8.gz
/usr/share/man/man8/usbmodules_selinux.8.gz
/usr/share/man/man8/usbmuxd_selinux.8.gz
/usr/share/man/man8/user_dbusd_selinux.8.gz
/usr/share/man/man8/user_gkeyringd_selinux.8.gz
/usr/share/man/man8/user_mail_selinux.8.gz
/usr/share/man/man8/user_screen_selinux.8.gz
/usr/share/man/man8/user_selinux.8.gz
/usr/share/man/man8/user_seunshare_selinux.8.gz
/usr/share/man/man8/user_ssh_agent_selinux.8.gz
/usr/share/man/man8/user_wine_selinux.8.gz
/usr/share/man/man8/useradd_selinux.8.gz
/usr/share/man/man8/usernetctl_selinux.8.gz
/usr/share/man/man8/utempter_selinux.8.gz
/usr/share/man/man8/uucpd_selinux.8.gz
/usr/share/man/man8/uuidd_selinux.8.gz
/usr/share/man/man8/uux_selinux.8.gz
/usr/share/man/man8/varnishd_selinux.8.gz
/usr/share/man/man8/varnishlog_selinux.8.gz
/usr/share/man/man8/vdagent_selinux.8.gz
/usr/share/man/man8/vhostmd_selinux.8.gz
/usr/share/man/man8/virsh_selinux.8.gz
/usr/share/man/man8/virsh_ssh_selinux.8.gz
/usr/share/man/man8/virt_bridgehelper_selinux.8.gz
/usr/share/man/man8/virt_qemu_ga_selinux.8.gz
/usr/share/man/man8/virt_qemu_ga_unconfined_selinux.8.gz
/usr/share/man/man8/virt_selinux.8.gz
/usr/share/man/man8/virtd_lxc_selinux.8.gz
/usr/share/man/man8/virtd_selinux.8.gz
/usr/share/man/man8/virtlogd_selinux.8.gz
/usr/share/man/man8/vlock_selinux.8.gz
/usr/share/man/man8/vmtools_helper_selinux.8.gz
/usr/share/man/man8/vmtools_selinux.8.gz
/usr/share/man/man8/vmtools_unconfined_selinux.8.gz
/usr/share/man/man8/vmware_host_selinux.8.gz
/usr/share/man/man8/vmware_selinux.8.gz
/usr/share/man/man8/vnstat_selinux.8.gz
/usr/share/man/man8/vnstatd_selinux.8.gz
/usr/share/man/man8/vpnc_selinux.8.gz
/usr/share/man/man8/w3c_validator_script_selinux.8.gz
/usr/share/man/man8/watchdog_selinux.8.gz
/usr/share/man/man8/watchdog_unconfined_selinux.8.gz
/usr/share/man/man8/wdmd_selinux.8.gz
/usr/share/man/man8/webadm_selinux.8.gz
/usr/share/man/man8/webalizer_script_selinux.8.gz
/usr/share/man/man8/webalizer_selinux.8.gz
/usr/share/man/man8/winbind_helper_selinux.8.gz
/usr/share/man/man8/winbind_selinux.8.gz
/usr/share/man/man8/wine_selinux.8.gz
/usr/share/man/man8/wireshark_selinux.8.gz
/usr/share/man/man8/wpa_cli_selinux.8.gz
/usr/share/man/man8/xauth_selinux.8.gz
/usr/share/man/man8/xdm_selinux.8.gz
/usr/share/man/man8/xdm_unconfined_selinux.8.gz
/usr/share/man/man8/xenconsoled_selinux.8.gz
/usr/share/man/man8/xend_selinux.8.gz
/usr/share/man/man8/xenstored_selinux.8.gz
/usr/share/man/man8/xguest_dbusd_selinux.8.gz
/usr/share/man/man8/xguest_gkeyringd_selinux.8.gz
/usr/share/man/man8/xguest_selinux.8.gz
/usr/share/man/man8/xserver_selinux.8.gz
/usr/share/man/man8/ypbind_selinux.8.gz
/usr/share/man/man8/yppasswdd_selinux.8.gz
/usr/share/man/man8/ypserv_selinux.8.gz
/usr/share/man/man8/ypxfr_selinux.8.gz
/usr/share/man/man8/zabbix_agent_selinux.8.gz
/usr/share/man/man8/zabbix_script_selinux.8.gz
/usr/share/man/man8/zabbix_selinux.8.gz
/usr/share/man/man8/zarafa_deliver_selinux.8.gz
/usr/share/man/man8/zarafa_gateway_selinux.8.gz
/usr/share/man/man8/zarafa_ical_selinux.8.gz
/usr/share/man/man8/zarafa_indexer_selinux.8.gz
/usr/share/man/man8/zarafa_monitor_selinux.8.gz
/usr/share/man/man8/zarafa_server_selinux.8.gz
/usr/share/man/man8/zarafa_spooler_selinux.8.gz
/usr/share/man/man8/zebra_selinux.8.gz
/usr/share/man/man8/zoneminder_script_selinux.8.gz
/usr/share/man/man8/zoneminder_selinux.8.gz
/usr/share/man/man8/zos_remote_selinux.8.gz
/usr/share/man/ru/man8/ftpd_selinux.8.gz
/usr/share/man/ru/man8/httpd_selinux.8.gz
/usr/share/man/ru/man8/kerberos_selinux.8.gz
/usr/share/man/ru/man8/named_selinux.8.gz
/usr/share/man/ru/man8/nfs_selinux.8.gz
/usr/share/man/ru/man8/rsync_selinux.8.gz
/usr/share/man/ru/man8/samba_selinux.8.gz
/usr/share/man/ru/man8/ypbind_selinux.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon May 9 17:37:21 2022